Cisco DNA Center Second-Generation Appliance Installation Guide, Release 2.3.3
Cisco DNA Center Second-Generation Appliance Installation Guide, Release 2.3.3
Cisco DNA Center Second-Generation Appliance Installation Guide, Release 2.3.3
Release 2.3.3
First Published: 2022-04-26
Last Modified: 2023-03-20
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2022–2023 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 6 Configure the 44/56-Core Appliance Using the Browser-Based Wizard 123
CHAPTER 7 Configure the 112-Core Appliance Using the Browser-Based Wizard 177
Feature Description
Feature Description
The following connectors are available but not typically used in the day-to-day
operation of Cisco DNA Center:
• One RS-232 serial port (RJ-45 connector)
• One VGA (DB-15) connector
• Two USB 3.0 connectors
• One front-panel KVM connector that is used with the KVM cable, which provides
two USB 2.0, one VGA (DB-15), and one serial port (RS-232) RJ-45 connector.
Video Video Graphics Array (VGA) video resolution up to 1920 x 1200, 16 bpp at 60 Hz,
and up to 512 MB of video memory (8 MB is allocated by default).
Feature Description
Feature Description
The following connectors are available but not typically used in the day-to-day
operation of Cisco DNA Center:
• One RS-232 serial port (RJ-45 connector)
• One VGA (DB-15) connector
• Two USB 3.0 connectors
• One front-panel KVM connector that is used with the KVM cable, which provides
two USB 2.0, one VGA (DB-15), and one serial port (RS-232) RJ-45 connector.
Video Video Graphics Array (VGA) video resolution up to 1920 x 1200, 16 bpp at 60 Hz,
and up to 512 MB of video memory (8 MB is allocated by default).
Feature Description
Feature Description
Processors Two CPU modules, each with two 28-core Intel 8276 2.2 GHz processors
The following connectors are available but not typically used in the day-to-day
operation of Cisco DNA Center:
• One RS-232 serial port (RJ-45 connector)
• One VGA (DB-15) connector
• Three USB 3.0 connectors
• One front-panel KVM connector that is used with the KVM cable, which provides
two USB 2.0, one VGA (DB-15), and one serial port (RS-232) RJ-45 connector.
Cooling Four hot-swappable fan modules with two fans in each for front-to-rear cooling.
Video VGA video resolution up to 1600 x1200, 16 bpp at 60 Hz, and up to 256 MB of video
memory.
Note If you are viewing this guide on Cisco.com, click any of its figures to view a full-sized version.
Component Description
Component Description
Component Description
10 KVM connector. Used with a KVM cable that provides two USB 2.0, one VGA, and one
serial connector.
Component Description
Component Description
• Amber, blinking: The appliance is in a critical fault state, which may be due to one
or more of the following causes:
• Boot failure
• Fatal processor and/or bus error detected
• Over-temperature condition
Component Description
9 KVM connector. Used with a KVM cable that provides two USB 2.0, one VGA, and one
serial connector.
Note If NIC bonding has been enabled on your Cisco DNA Center appliance, two instances of the Enterprise,
Intracluster, Management, and Internet port are available to configure and use. See NIC Bonding Overview,
on page 67 for more information.
Callout Description
3, 10 1-Gbps/10-Gbps Management Port (Network Adapter 3): This Ethernet port can support
1 Gbps and 10 Gbps, depending on the link partner capability. It is identified as Network
Adapter 3 in the Maglev Configuration wizard. Connect this port to a switch that provides
access to your enterprise management network.
• The primary instance (callout 3) is labeled 1 on the rear panel.
• The secondary instance (callout 10) is the fourth port on the Intel X710-DA4 NIC
in the appliance's PCIe riser 2/slot 2.
This port has a link status LED and a link speed LED. When the status LED is:
• Off: No link is present.
• Green, blinking: Traffic is present on the active link.
• Green: Link is active, but there is no traffic present.
Callout Description
4, 11 1-Gbps/10-Gbps Internet Port (Network Adapter 4): This Ethernet port can support 1
Gbps and 10 Gbps, depending on the link partner capability. It is identified as Network
Adapter 4 in the Maglev Configuration wizard. This port is optional and is used for
connecting to the Internet when it is not possible to do so via the 10-Gbps Enterprise
port. Connect to the Internet or a proxy server that has connections to the Internet.
• The primary instance (callout 4) is labeled 2 on the rear panel.
• The secondary instance (callout 11) is the third port on the Intel X710-DA4 NIC in
the appliance's PCIe riser 2/slot 2.
This port has a link status LED and a link speed LED. When the link status LED is:
• Off: No link is present.
• Green, blinking: Traffic is present on the active link.
• Green: Link is active, but there is no traffic.
6 1-Gbps Cisco IMC Port: This is the embedded port to the right of the VGA video port
and to the left of the RJ45 serial port. It is assigned an IP address when you enable
browser access to the appliance's Cisco IMC GUI (see Enable Browser Access to Cisco
Integrated Management Controller). This port is reserved for out-of-band management
of the appliance chassis and software. Connect this port to a switch that provides access
to your enterprise management network.
This port has a link status LED and a link speed LED. When the link status LED is:
• Off: No link is present.
• Green, blinking: Traffic is present on the active link.
• Green: Link is active, but there is no traffic present.
Callout Description
9 Power supplies (up to two: redundant as 1+1). Each power supply has a power supply
fault LED and an AC power LED.
When the fault LED is:
• Off: The power supply is operating normally.
• Amber, blinking: An event warning threshold has been reached, but the power
supply continues to operate.
• Amber, solid: A critical fault threshold has been reached, causing the power supply
to shut down (for example, a fan failure or an over-temperature condition).
12, 15 10-Gbps Enterprise Port (Network Adapter 1): This port is identified as Network Adapter
1 in the Maglev Configuration wizard. Connect it to a switch with connections to the
Enterprise network.
• The primary instance (callout 15) is the left-hand port on the Intel X710-DA2 NIC
in the appliance's PCIe riser 1/slot 1.
• The secondary instance (callout 12) is the second port on the Intel X710-DA4 NIC
in the appliance's PCIe riser 2/slot 2.
This port has a link status (ACT) LED and a link speed (LINK) LED.
When the link status LED is:
• Off: No link is present.
• Green, blinking: Traffic is present on the active link.
• Green: Link is active, but there is no traffic present.
Callout Description
13, 14 10-Gbps Intracluster Port (Network Adapter 2): This port is identified as Network Adapter
2 in the Maglev Configuration wizard. Connect this port to a switch with connections to
the other nodes in the cluster.
• The primary instance (callout 14) is the right-hand port on the Intel X710-DA2 NIC
in the appliance PCIe riser 1/slot 1.
• The secondary instance (callout 13) is first port on the Intel X710-DA4 NIC in the
appliance's PCIe riser 2/slot 2.
This port is located on the Intel X710-DA4 NIC, which is located in the appliance's PCIe
riser 2/slot 2.
This port has a link status (ACT) LED and a link speed (LINK) LED.
When the link status LED is:
• Off: No link is present.
• Green, blinking: Traffic is present on the active link.
• Green: Link is active, but there is no traffic present.
Note If NIC bonding has enabled on your Cisco DNA Center appliance, two instances of the Enterprise, Intracluster,
Management, and Internet port are available to configure and use. See NIC Bonding Overview, on page 67
for more information.
Callout Description
4, 13 1-Gbps/10-Gbps Management Port (Network Adapter 3): This Ethernet port can support
1 Gbps and 10 Gbps, depending on the link partner capability. It is identified as Network
Adapter 3 in the Maglev Configuration wizard. Connect this port to a switch that provides
access to your enterprise management network.
• The primary instance (callout 4) is labeled 1 on the rear panel.
• The secondary instance (callout 13) is the top port on the Intel X710-DA4 NIC in
the appliance's PCIe riser 2/slot 12.
This port has a link status LED and a link speed LED. When the status LED is:
• Off: No link is present.
• Green, blinking: Traffic is present on the active link.
• Green: Link is active, but there is no traffic present.
Callout Description
5, 12 1-Gbps/10-Gbps Internet Port (Network Adapter 4): This Ethernet port can support 1
Gbps and 10 Gbps, depending on the link partner capability. It is identified as Network
Adapter 4 in the Maglev Configuration wizard. This port is optional and is used for
connecting to the Internet when it is not possible to do so via the 10-Gbps Enterprise
port. Connect to the Internet or a proxy server that has connections to the Internet.
• The primary instance (callout 5) is labeled 2 on the rear panel.
• The secondary instance (callout 12) is the second port from the top on the Intel
X710-DA4 NIC in the appliance's PCIe riser 2/slot 12.
This port has a link status LED and a link speed LED. When the link status LED is:
• Off: No link is present.
• Green, blinking: Traffic is present on the active link.
• Green: Link is active, but there is no traffic.
6 1-Gbps Cisco IMC Port: This is the 10/100/1000 Ethernet dedicated management port
(Base-T), which is located to the right of the Management port. It is identified as 3 on
the rear panel. This port is assigned an IP address when you enable browser access to
the appliance's Cisco IMC GUI (see Enable Browser Access to Cisco Integrated
Management Controller). It is reserved for out-of-band management of the appliance
chassis and software. Connect this port to a switch that provides access to your enterprise
management network.
This port has a link status LED and a link speed LED. When the link status LED is:
• Off: No link is present.
• Green, blinking: Traffic is present on the active link.
• Green: Link is active, but there is no traffic present.
Callout Description
10, 15 10-Gbps Intracluster Port (Network Adapter 2): This port is identified as Network Adapter
2 in the Maglev Configuration wizard. Connect this port to a switch with connections to
the other nodes in the cluster.
• The primary instance (callout 15) is the bottom port on the Intel X710-DA2 NIC
in the appliance PCIe riser 1/slot 9.
• The secondary instance (callout 10) is the bottom port on the Intel X710-DA4 NIC
in the appliance's PCIe riser 2/slot 12.
This port has a link status (ACT) LED and a link speed (LINK) LED.
When the link status LED is:
• Off: No link is present.
• Green, blinking: Traffic is present on the active link.
• Green: Link is active, but there is no traffic present.
Callout Description
11, 16 10-Gbps Enterprise Port (Network Adapter 1): This port is identified as Network Adapter
1 in the Maglev Configuration wizard. If NIC bonding is enabled on your appliance,
connect this port to a switch with connections to the enterprise network.
• The primary instance (callout 16) is the top port on the Intel X710-DA2 NIC in the
appliance PCIe riser 1/slot 9.
• The secondary instance (callout 11) is the third port from the top on the Intel
X710-DA4 NIC in the appliance's PCIe riser 2/slot 12.
This port has a link status (ACT) LED and a link speed (LINK) LED.
When the link status LED is:
• Off: No link is present.
• Green, blinking: Traffic is present on the active link.
• Green: Link is active, but there is no traffic present.
Physical Specifications
The following table lists the physical specifications for the appliance. Unless indicated, the specifications
apply to the 44, 56, and 112-core appliances.
Description Specification
Description Specification
Maximum weight (fully loaded chassis) 44 and 56-core appliance: 37.5 lb. (17.0 kg)
112-core appliance: 146 lb. (66.2 kg)
Environmental Specifications
The following table lists the environmental specifications for the Cisco DNA Center appliance. Unless
indicated, the specifications apply to the 44, 56, and 112-core appliances.
Description Specification
Description Specification
Sound power level, measure A-weighted per ISO7779 44 and 56-core appliance: 5.5
LwAd (Bels), operation at 73°F (23°C)
112-core appliance:
• Minimum configuration: 7.08
• Typical configuration: 7.67
• Maximum configuration: 8.24
Power Specifications
The specifications for the power supplies provided with the Cisco DNA Center appliance are listed in the
table below. The 44 and 56-core appliance ships with two 770 W power supplies (Cisco part number
UCSC-PSU1-770W) and the 112-core appliance ships with four 1600 W AC power supplies (Cisco part
number UCSC-PSU1-1600W). Unless indicated, the specifications apply to both power supplies.
Description Specification
1600 W:
• Nominal range: 200–240 VAC
• Range: 180–264 VAC
Description Specification
Note You can get more specific power information for the exact configuration of your appliance by using the Cisco
UCS Power Calculator: http://ucspowercalc.cisco.com
Planning Workflow
You must perform the following planning and information-gathering tasks before attempting to install,
configure, and set up your Cisco DNA Center appliance. After you complete these tasks, you can continue
by physically installing your appliance in the data center.
1. Review the recommended cabling and switching requirements for standalone and cluster installations.
For more information, see Interface Cable Connections.
2. Gather the IP addressing, subnetting, and other IP traffic information that you will apply during appliance
configuration. For more information, see Required IP Addresses and Subnets.
3. Prepare a solution for the required access to web-based resources. For more information, see Required
Internet URLs and Fully Qualified Domain Names and Provide Secure Access to the Internet.
4. Reconfigure your firewalls and security policies for Cisco DNA Center traffic. For more information, see
Required Network Ports. If you are using Cisco DNA Center to manage a Cisco Software-Defined Access
(SD-Access) network, also see Required Ports and Protocols for Cisco Software-Defined Access.
5. Gather the additional information used during appliance configuration and first-time setup. For more
information, see Required Configuration Information and Required First-Time Setup Information.
Note • During appliance configuration, the Maglev Configuration wizard does not let you proceed until you
assign the Cluster Link option to an interface. For both single-node and three-node deployments in a
production environment, assign the Intracluster port as the Cluster Link.
• Be aware that the interface marked as the Cluster Link cannot be changed after configuration completes.
Later, if you must change the interface marked as the Cluster Link, you are required to reimage the
appliance. (For a description of the tasks you need to complete in order to reimage your Cisco DNA
Center appliance, see Reimage the Appliance, on page 74.) With this in mind, we recommend that you
set up the Cluster Port with an IP address, so as to allow for expansion to a three-node cluster in the
future. Also, make sure that the cluster link interface is connected to a switch port and is in the UP state.
• If you plan to build multiple clusters, you must use a separate IP scheme for each cluster in order to
prevent cross-cluster interaction (which might corrupt the clusters).
• (Required) 10-Gbps Enterprise Port (Network Adapter 1): The purpose of this port is to enable Cisco
DNA Center to communicate with and manage your network. Connect this port to a switch with
connections to the enterprise network and configure one IP address with a subnet mask for the port.
Primary instance:
• On the 44 and 56-core appliance, this is the left-hand port on the Intel X710-DA2 NIC that resides
in PCIe slot 1.
• On the 112-core appliance, this is the top 10-Gbps port on the Intel X710-DA2 NIC that resides in
PCIe slot 9.
Secondary instance:
• On the 44 and 56-core appliance, this is the second port on the Intel X710-DA4 NIC that resides in
PCIe slot 2.
• On the 112-core appliance, this is the third 10-Gbps port from the top on the Intel X710-DA4 NIC
that resides in PCIe slot 12.
• (Required) 10-Gbps Intracluster Port (Network Adapter 2): The purpose of this port is to enable
communications among the primary and secondary nodes in a cluster. Connect this port to a switch with
connections to the other nodes in the cluster and configure one IP address with a subnet mask for the
port.
Primary instance:
• On the 44 and 56-core appliance, this is the right-hand port on the Intel X710-DA2 NIC that resides
in PCIe slot 1.
• On the 112-core appliance, this is the bottom 10-Gbps port on the Intel X710-DA2 NIC that resides
in PCIe slot 9.
Secondary instance:
• On the 44 and 56-core appliance, this is the first port on the Intel X710-DA4 NIC that resides in
PCIe slot 2.
• On the 112-core appliance, this is the bottom 10-Gbps port on the Intel X710-DA4 NIC that resides
in PCIe slot 12.
• (Optional) 1-Gbps/10-Gbps Management Port (Network Adapter 3): This port provides access to
the Cisco DNA Center GUI, allowing users to use the software on the appliance. Connect this port to a
switch with connections to your enterprise management network, and configure one IP address with a
subnet mask for the port.
Primary instance: Labeled 1 on the appliance's rear panel.
Secondary instance:
• On the 44 and 56-core appliance, this is the fourth port on the Intel X710-DA4 NIC that resides in
PCIe slot 2.
• On the 112-core appliance, this is the top 10-Gbps port on the Intel X710-DA4 NIC that resides in
PCIe slot 12.
• (Optional) 1-Gbps/10-Gbps Internet Port (Network Adapter 4): This port, labeled 2 on the rear panel,
is optional. Use it only if you cannot connect the appliance to the Internet (including to your Internet
proxy server) using the 10-Gbps Enterprise Port (Network Adapter 1). If you need to use this port, connect
it to a switch with connections to your Internet proxy server and configure one IP address with a subnet
mask for the port.
Primary instance: Labeled 2 on the appliance's rear panel.
Secondary instance:
• On the 44 and 56-core appliance, this is the third port on the Intel X710-DA4 NIC that resides in
PCIe slot 2.
• On the 112-core appliance, this is the second 10-Gbps port from the top on the Intel X710-DA4
NIC that resides in PCIe slot 12.
• (Optional, but strongly recommended) 1-Gbps Cisco IMC Port: This port provides browser access
to the Cisco Integrated Management Controller (Cisco IMC) out-of-band appliance management interface
and its GUI. Its purpose is to allow you to manage the appliance and its hardware. Connect this port to
a switch with connections to your enterprise management network and configure an IP address with a
subnet mask for the port.
The following figures show the recommended connections for a single-node Cisco DNA Center cluster, as
well as the label that's assigned to each interface:
Note For both the Management and Internet interface, their primary instance has a bandwidth of 1 Gbps and their
secondary instance 10 Gbps.
Note For both the Management and Internet interface, their primary instance has a bandwidth of 1 Gbps and their
secondary instance 10 Gbps.
The connections for each node in a three-node Cisco DNA Center cluster are the same as those for a single-node
cluster and use the same ports. Do the following when you cable a three-node cluster:
• Connect the primary instance of each node's Enterprise, Intracluster, Management, and Internet Port, as
well as the Cisco IMC port, to the primary switch.
• Connect the secondary instance of each node's Enterprise, Intracluster, Management, and Internet Port
to the secondary switch.
For more details on each of the ports, see the rear panel diagram and accompanying descriptions for your
chassis in Front and Rear Panels.
Note Multinode cluster deployments require all the member nodes to be in the same network and at the same site.
The appliance does not support distribution of nodes across multiple networks or sites.
When cabling the 10-Gbps enterprise and cluster ports, note that the ports support only the following media
types:
• SFP-10G-SR-S (Short range, MMF)
• SFP-10G-LR (Long range, SMF)
• SFP-H10GB-CU1M (Twinax cable, passive, 1 Meter)
• SFP-H10GB-CU3M (Twinax cable, passive, 3 Meters)
• SFP-H10GB-CU5M (Twinax cable, passive, 5 Meters)
• SFP-H10GB-ACU7M (Twinax cable, active, 7 Meters)
Note All of the IP addresses called for in these requirements must be valid IPv4 addresses with valid IPv4 netmasks.
Ensure that the addresses and their corresponding subnets do not overlap. Service communication issues can
result if they do.
You will also need the following additional IP addresses and dedicated IP subnets, which are prompted for
and applied during configuration of the appliance:
• Cluster Virtual IP Addresses: One virtual IP (VIP) address per configured network interface per cluster.
This requirement applies to three-node clusters and single-node clusters that are likely to be converted
into a three-node cluster in the future. You must supply a VIP for each network interface you configure.
Each VIP should be from the same subnet as the IP address of the corresponding configured interface.
There are four interfaces on each appliance: Enterprise, Cluster, Management, and Internet. At a minimum,
you must configure the Enterprise and Cluster port interfaces, as they are required for Cisco DNA Center
functionality. An interface is considered configured if you supply an IP address for that interface, along
with a subnet mask and one or more associated gateways or static routes. If you skip an interface entirely
during configuration, that interface is considered as not configured.
Note the following:
• If you have a single-node setup and do not plan to convert it into a three-node cluster in the future,
you are not required to specify a VIP address. However, if you decide to do so, you must specify a
VIP address for every configured network interface (just as you would for a three-node cluster).
• If the intracluster link for a single-node cluster goes down, the VIP addresses associated with the
Management and Enterprise interfaces also go down. When this happens, Cisco DNA Center is
unusable until the intracluster link is restored (because the Software Image Management [SWIM]
and Cisco Identity Services Engine [ISE] integration is not operational and Cisco DNA Assurance
data is not displayed because information cannot be gathered from Network Data Platform [NDP]
collectors).
• Do not use a link-local or nonroutable IP address for the Enterprise or Management interface.
• Default Gateway IP Address: The IP address for your network's preferred default gateway. If no other
routes match the traffic, traffic will be routed through this IP address. Typically, you should assign the
default gateway to the interface in your network configuration that accesses the internet. For information
on security considerations to keep in mind when deploying Cisco DNA Center, see the Cisco Digital
Network Architecture Center Security Best Practices Guide.
• DNS Server IP Addresses: The IP address for one or more of your network's preferred Domain Name
System (DNS) servers. During configuration, you can specify multiple DNS server IP addresses by
entering them as a space-separated list.
• (Optional) Static Route Addresses: The IP addresses, subnet masks, and gateways for one or more
static routes. During configuration, you can specify multiple static-route IP addresses, netmasks, and
gateways by entering them as a space-separated list.
You can set one or more static routes for an interface on the appliance. You should supply static routes
when you want to route traffic in a specific direction other than the default gateway. Each of the interfaces
with static routes will be set as the device the traffic will be routed through in the IP route command
table. For this reason, it is important to match the static route directions with the interface though which
the traffic will be sent.
Static routes are not recommended in network device routing tables such as those used by switches and
routers. Dynamic routing protocols are better for this. However, you should add static routes where
needed, to allow the appliance access to particular parts of the network that can be reached no other way.
• NTP Server IP Addresses: The DNS-resolvable hostname or IP address for at least one Network Time
Protocol (NTP) server.
During configuration, you can specify multiple NTP server IP addresses/masks or hostnames by entering
them as a space-separated list. For a production deployment, we recommend that you configure a minimum
of three NTP servers.
Specify these NTP servers during preflight hardware synchronization, and again during the configuration
of the software on each appliance in the cluster. Time synchronization is critical to the accuracy of data
and the coordination of processing across a multihost cluster. Before deploying the appliance in a
production environment, make sure that the time on the appliance system clock is current and that the
NTP servers you specified are keeping accurate time. If you are planning to integrate the appliance with
ISE, you should also ensure that ISE is synchronizing with the same NTP servers as the appliance.
• Container Subnet: Identifies one dedicated IP subnet for the appliance to use in managing and getting
IP addresses for communications among its internal application services, such as Assurance, inventory
collection, and so on. By default, Cisco DNA Center configures a link-local subnet (169.254.32.0/20)
for this parameter, and we recommend that you use this subnet. If you choose to enter another subnet,
ensure that it does not conflict with or overlap any other subnet used by Cisco DNA Center's internal
network or any external network. Also ensure that the minimum size of the subnet is 21 bits. The subnet
you specify must conform with the IETF RFC 1918 and RFC 6598 specifications for private networks,
which support the following address ranges:
• 10.0.0.0/8
• 172.16.0.0/12
• 192.168.0.0/16
• 100.64.0.0/10
For details, see RFC 1918, Address Allocation for Private Internets, and RFC 6598, IANA-Reserved
IPv4 Prefix for Shared Address Space.
Important • Ensure that you specify a valid CIDR subnet. Otherwise, incorrect bits will
be present in the 172.17.1.0/20 and 172.17.61.0/20 subnets.
• After configuration of your Cisco DNA Center appliance is completed, you
cannot assign a different subnet without first reimaging the appliance (see
Reimage the Appliance for more information).
• Cluster Subnet: Identifies one dedicated IP subnet for the appliance to use in managing and getting IPs
for communications among its infrastructure services, such as database access, the message bus, and so
on. By default, Cisco DNA Center configures a link-local subnet (169.254.48.0/20) for this parameter,
and we recommend that you use this subnet. If you choose to enter another subnet, ensure that it does
not conflict with or overlap any other subnet used by Cisco DNA Center's internal network or any external
network. Also ensure that the minimum size of the subnet is 21 bits. The subnet you specify must conform
with the IETF RFC 1918 and RFC 6598 specifications for private networks, which support the following
address ranges:
• 10.0.0.0/8
• 172.16.0.0/12
• 192.168.0.0/16
• 100.64.0.0/10
For details, see RFC 1918, Address Allocation for Private Internets, and RFC 6598, IANA-Reserved
IPv4 Prefix for Shared Address Space.)
If you were to specify 10.10.10.0/21 as your Container subnet, you could also specify a Cluster subnet
of 10.0.8.0/21 since these two subnets do not overlap. Also note that the configuration wizard detects
overlaps (if any) between these subnets and prompts you to correct the overlap.
Important • Ensure that you specify a valid CIDR subnet. Otherwise, incorrect bits will
be present in the 172.17.1.0/20 and 172.17.61.0/20 subnets.
• After configuration of your Cisco DNA Center appliance is completed, you
cannot assign a different subnet without first reimaging the appliance (see
Reimage the Appliance for more information).
• When entering an IP address for the Cluster port, container subnet, or cluster
subnet, don't specify an address that falls within the 169.254.0.0/23 subnet.
The recommended total IP address space for the two Container and Cluster subnets contains 4,096 addresses,
broken down into two /21 subnets of 2,048 addresses each. The two /21 subnets must not overlap. The Cisco
DNA Center internal services require a dedicated set of IP addresses to operate (a Cisco DNA Center
microservice architecture requirement). To accommodate this requirement, you must allocate two dedicated
subnets for each Cisco DNA Center system.
One reason the appliance requires this amount of address space is to maintain system performance. Because
it uses internal routing and tunneling technologies for east-west (inter-node) communications, using overlapping
address spaces forces the appliance to run Virtual Routing and Forwarding (VRF) FIBs internally. This leads
to multiple encaps and decaps for packets going from one service to another, causing high internal latency at
a very low level, with cascading impacts at higher layers.
Another reason is the Cisco DNA Center Kubernetes-based service containerization architecture. Each appliance
uses the IP addresses in this space for each Kubernetes K8 node. Multiple nodes can make up a single service.
Currently, Cisco DNA Center supports more than 100 services, each requiring several IP addresses, and new
features and corresponding services are being added all the time. The address space requirement is purposely
kept large at the start to ensure that Cisco can add new services and features without running out of IP addresses
or requiring customers to reallocate contiguous address spaces simply to upgrade their systems.
The services supported over these subnets are also enabled at Layer 3. The Cluster space, in particular, carries
data between application and infrastructure services, and is heavily used.
The RFC 1918 and RFC 6598 requirement is because of the requirement by Cisco DNA Center to download
packages and updates from the cloud. If the selected IP address ranges do not conform with RFC 1918 and
RFC 6598, this can quickly lead to problems with public IP address overlaps.
In order to... ...Cisco DNA Center must access these URLs and FQDNs
In order to... ...Cisco DNA Center must access these URLs and FQDNs
Allow Cisco authorized specialists to collect troubleshooting • For Cisco DNA Center 2.3.3.0–2.3.3.5:
data when Cisco DNA Center Remote Support functionality
• http://rabbitmq.dev.cisco-aws-lm.com:80
is enabled.
Note A TLS web socket resides within this
connection, protecting certificate authority
(CA) operations at the payload level.
• https://ca.dev.cisco-aws-lm.com:80
In order to... ...Cisco DNA Center must access these URLs and FQDNs
For Cisco AI Network Analytics data collection, configure • https://api.use1.prd.kairos.ciscolabs.com (US East Region)
your network or HTTP proxy to allow outbound HTTPS
(TCP 443) access to the cloud hosts. • https://api.euc1.prd.kairos.ciscolabs.com (EU Central Region)
Access a menu of interactive help flows that let you complete https://ec.walkme.com
specific tasks from the GUI.
1
Cisco owns and maintains ciscoconnectdna.com and its subdomains. The Cisco Connect DNA infrastructure meets Cisco
Security and Trust guidelines and undergoes continuous security testing. This infrastructure is robust, with built-in load balancing
and automation capabilities, and is monitored and maintained by a cloud operations team to ensure 24x7x365 availability.
Note For information on security considerations when deploying Cisco DNA Center, see the Cisco DNA Center
Security Best Practices Guide.
67 BOOTP UDP
80 HTTP TCP
53 DNS UDP
Note Additionally, you can configure your network to allow outgoing IP traffic from the appliance to the Cisco
addresses at: https://www.cisco.com/security/pki/. The appliance uses the IP addresses listed at the above
URL to access Cisco-supported certificates and trust pools.
If you have implemented Cisco SD-Access in your network, use the information in the following tables to
plan firewall and security policies that secure your Cisco SD-Access infrastructure properly while providing
Cisco DNA Center with the access it requires to automate your network management.
Any Cisco DNA UDP 53 DNS Server From Cisco DNA Center to DNS server
Center
Any Cisco DNA TCP 22 Fabric underlay From Cisco DNA Center to fabric
Center switches' loopbacks for SSH
Any Cisco DNA TCP 23 Fabric underlay From Cisco DNA Center to fabric
Center switches' loopbacks for TELNET
Any Cisco DNA UDP 161 Fabric underlay From Cisco DNA Center to fabric
Center switches' loopbacks for SNMP device
discovery
ICMP Cisco DNA ICMP Fabric underlay From Cisco DNA Center to fabric
Center switches' loopbacks for SNMP device
discovery
Any Cisco DNA TCP 443 Fabric underlay From Cisco DNA Center to fabric
Center switches for software upgrades (also to
the internet if there is no proxy)
Any Cisco DNA UDP 6007 Switches and From Cisco DNA Center to switches
Center routers and routers for NetFlow
Any Cisco DNA TCP 830 Fabric underlay From Cisco DNA Center to fabric
Center switches for Netconf (Cisco SD-Access
embedded wireless)
UDP 123 Cisco DNA UDP 123 Fabric underlay From Cisco DNA Center to fabric
Center switches for the initial period during
LAN automation
Any Cisco DNA UDP 123 NTP Server From Cisco DNA Center to NTP server
Center
Any Cisco DNA TCP 22, UDP Cisco Wireless From Cisco DNA Center to Cisco
Center 161 Controller Wireless Controller
ICMP Cisco DNA ICMP Cisco Wireless From Cisco DNA Center to Cisco
Center Controller Wireless Controller
Any AP TCP 32626 Cisco DNA Center Used for receiving traffic statistics and
packet capture data used by the Cisco
DNA Assurance Intelligent Capture
(gRPC) feature.
2
Cluster, PKI, SFTP server, and proxy port traffic are not included in this table.
Any Cisco DNA Center TCP 443 registry.ciscoconnectdna.com Download Cisco DNA
Center package updates
Any Cisco DNA Center TCP 443 www.ciscoconnectdna.com Download Cisco DNA
Center package updates
Any Cisco DNA Center TCP 443 registry-cdn.ciscoconnectdna.com Download Cisco DNA
Center package updates
Any Cisco DNA Center TCP 443 cdn.ciscoconnectdna.com Download Cisco DNA
Center package updates
Any Cisco DNA Center TCP 443 software.cisco.com Download device software
Any Cisco DNA Center TCP 443 cloudsso.cisco.com Validate Cisco.com and
Smart Account credentials
Any Cisco DNA Center TCP 443 cloudsso1.cisco.com Validate Cisco.com and
Smart Account credentials
Any Cisco DNA Center TCP 443 cloudsso2.cisco.com Validate Cisco.com and
Smart Account credentials
Any Cisco DNA Center TCP 443 apiconsole.cisco.com CSSM Smart Licensing API
Any Cisco DNA Center TCP 443 sso.cisco.com Cisco.com credentials and
Smart Licensing
Any Cisco DNA Center TCP 443 api.cisco.com Cisco.com credentials and
Smart Licensing
Any Cisco DNA Center TCP 443 apx.cisco.com Cisco.com credentials and
Smart Licensing
Any Cisco DNA Center TCP 443 dashboard.meraki.com Meraki integration
Any Cisco DNA Center TCP 443 api.meraki.com Meraki integration
Any Cisco DNA Center TCP 443 n63.meraki.com Meraki integration
Any Cisco DNA Center TCP 443 dnacenter.uservoice.com User feedback submission
Any Cisco DNA Center TCP 443 *.tiles.mapbox.com Render maps in the browser
Admin Client (for access through proxy;
the destination is
*.tiles.mapbox.com/*)
Any Cisco DNA Center TCP 443 www.mapbox.com Maps and Cisco Wireless
Controller country code
identification
UDP 68 Fabric UDP 67 DHCP server From fabric switches and routers to
underlay the DHCP server for DHCP Relay
packets initiated by the fabric edge
nodes.
Any Fabric TCP 80 Cisco DNA From fabric switch and router
underlay Center loopback IPs to Cisco DNA Center
for PnP
Any Fabric TCP 443 Cisco DNA From fabric switch and router
underlay Center loopback IPs to Cisco DNA Center
for image upgrade
Any Fabric UDP 162 Cisco DNA From fabric switch and router
underlay Center loopback IPs to Cisco DNA Center
for SNMP Traps
Any Fabric UDP 514 Cisco DNA From fabric switches and routers to
underlay Center Cisco DNA Assurance
Any Fabric UDP 6007 Cisco DNA From fabric switches and routers to
underlay Center Cisco DNA Center for NetFlow
Any Fabric UDP 123 Cisco DNA From fabric switches to Cisco DNA
underlay Center Center; used when doing LAN
automation
ICMP Fabric ICMP Cisco DNA From fabric switch and router
underlay Center loopbacks to Cisco DNA Center for
SNMP: device discovery
UDP 161 Fabric Any Cisco DNA From fabric switch and router
underlay Center loopbacks to Cisco DNA Center for
SNMP: Device Discovery
Any Fabric UDP 53 DNS Server From fabric switches and routers to
underlay DNS server for name resolution
TCP and Fabric TCP and UDP 4342 Fabric Routers LISP-encapsulated control messages
UDP 4342 underlay and Switches
TCP and Fabric Any Fabric Routers LISP control-plane communications
UDP 4342 underlay and Switches
Any Fabric UDP 4789 Fabric Routers Fabric-encapsulated data packets
underlay and Switches (VXLAN-GPO)
Any Fabric UDP ISE From fabric switch and router
underlay 1645/1646/1812/1813 loopback IPs to ISE for RADIUS
ICMP Fabric ICMP ISE From fabric switches and routers to
underlay ISE for troubleshooting
UDP Fabric Any ISE From fabric switches to ISE for
1700/3799 underlay care-of address (CoA)
Any Fabric UDP 123 NTP Server From fabric switch and router
underlay loopback IPs to the NTP server
Any control-plane UDP and TCP Cisco Wireless From control-plane loopback IP to
4342/4343 Controller Cisco Wireless Controller for
Fabric-enabled wireless
3
Border routing protocol, SPAN, profiling, and telemetry traffic are not included in this table.
Any Cisco Wireless UDP 6007 Cisco DNA From wireless controllers to
Controller Center Cisco DNA Center for NetFlow
network telemetry
ICMP Cisco Wireless ICMP Cisco DNA From Cisco Wireless Controller
Controller Center to allow ping for troubleshooting
Any Cisco Wireless UDP 53 DNS Server From Cisco Wireless Controller
Controller to DNS server
Any Cisco Wireless TCP 443 ISE From Cisco Wireless Controller
Controller to ISE for Guest SSID web
authorization
Any Cisco Wireless UDP 1645,1812 ISE From Cisco Wireless Controller
Controller to ISE for RADIUS
authentication
Any Cisco Wireless UDP 1646, ISE From Cisco Wireless Controller
Controller 1813 to ISE for RADIUS accounting
Any Cisco Wireless UDP 1700, ISE From Cisco Wireless Controller
Controller 3799 to ISE for RADIUS CoA
ICMP Cisco Wireless ICMP ISE From Cisco Wireless Controller
Controller to ISE ICMP for troubleshooting
Any Cisco Wireless UDP 123 NTP server From Cisco Wireless Controller
Controller to NTP server
Any ISE TCP 64999 Border From ISE to border node for SGT
Exchange Protocol (SXP)
Any ISE UDP 514 Cisco DNA Center From ISE to syslog server (Cisco DNA
Center)
UDP ISE Any Fabric underlay From ISE to fabric switches and routers
1645/1646/1812/1813 for RADIUS and authorization
Any ISE UDP Fabric underlay, From ISE to fabric switch and router
1700/3799 Cisco Wireless loopback IP addresses for RADIUS
Controller Change of Authorization (CoA).
UDP port 3799 must also be open from
ISE to the wireless controller for CoA.
ICMP ISE ICMP Fabric underlay From ISE to fabric switches for
troubleshooting
Any ISE UDP 123 NTP Server From ISE to NTP server
UDP ISE Any Cisco Wireless From ISE to Cisco Wireless Controller
1812/1645/1813/1646 Controller for RADIUS
ICMP ISE ICMP Cisco Wireless From ISE to Cisco Wireless Controller
Controller for troubleshooting
4
Note: High availability and profiling traffic are not included in this table.
The Linux password is encrypted and hashed in the Cisco DNA Center database. If you are deploying a
multinode cluster, you will also be prompted to enter the primary node's Linux password on each of the
secondary nodes.
• Password Generation Seed (Optional): Instead of creating a Linux password, you can enter a seed
phrase and click Generate Password. The Maglev Configuration wizard generates a random and secure
password using this seed phrase. You can further edit the generated password by using the Auto Generated
Password field.
• Administrator Passphrase: Identifies the password used for web access to Cisco DNA Center in a
cluster. This is the password for the superuser account admin, which you use to log in to Cisco DNA
Center for the first time (see Complete the Quick Start Workflow, on page 233). You are prompted to
change this password when you log in for the first time.
You must create this password because there is no default. The Administrator Passphrase must meet the
same requirements as the Linux password, described earlier.
• Cisco IMC User Password: Identifies the password used for access to the Cisco IMC GUI. The factory
default is password, but you are prompted to change it when you first set up Cisco IMC for access using
a web browser (see Enable Browser Access to Cisco Integrated Management Controller).
The Cisco IMC user password must meet the same requirements as the Linux password described earlier.
It can be changed back to password only by a reset to factory defaults.
• Primary Node IP Address: Required only when you are installing secondary nodes in a cluster. This
is the IP address of the cluster port on the primary node (see Interface Cable Connections).
For details about how to launch and respond to the first-time setup wizard that prompts you for this information,
see Complete the Quick Start Workflow, on page 233.
You will also need the following information to complete the remaining setup tasks, which can be done after
your first login:
• ISE Server IP and Credentials: You will need the Cisco ISE server IP address and credentials,
administrative user name, and password. These are needed to log in to and configure your organization's
ISE server to share data with Cisco DNA Center, as explained in Integrate Cisco ISE with Cisco DNA
Center.
Installation of or upgrade to Cisco DNA Center checks to see if Cisco ISE is configured as an
authentication and policy (AAA) server. If the correct version of Cisco ISE is already configured, you
can start migrating group policy data from Cisco ISE to Cisco DNA Center.
If Cisco ISE is not configured, or if the required version of Cisco ISE is not present, Cisco DNA Center
installs, but Group Based Policy is disabled. You must install or upgrade Cisco ISE and connect it to
Cisco DNA Center. You can then start the data migration.
Cisco DNA Center data present in the previous version is preserved when you upgrade. The data migration
operation merges data from Cisco DNA Center and Cisco ISE. If the migration encounters a conflict,
preference is given to data from Cisco ISE.
If Cisco DNA Center becomes unavailable, and it is imperative to manage policies before Cisco DNA
Center becomes available once more, there is an option in Cisco ISE to override the Read-Only setting.
This allows you to make policy changes directly in Cisco ISE. After Cisco DNA Center is available
again, you must disable the Read-Only override on Cisco ISE, and re-synchronize the policy data on
Cisco DNA Center Group Based Access Control Settings page. Only use this option when absolutely
necessary, since changes made directly in Cisco ISE are not propagated to Cisco DNA Center.
• Authorization and Policy Server Information: If you are using Cisco ISE as your authentication and
policy server, you will need the same information listed in the previous bullet, plus the ISE CLI user
name, CLI password, server FQDN, a subscriber name (such as cdnac), the ISE SSH key (optional), the
protocol choice (RADIUS or TACACS), the authentication port, the accounting port, and retry and
timeout settings.
If you are using an authorization and policy server that is not Cisco ISE, you will need the server's IP
address, protocol choice (RADIUS or TACACS), authentication port, accounting port, and retry and
timeout settings.
This information is required to integrate Cisco DNA Center with your chosen authentication and policy
server, as explained in Configure Authentication and Policy Servers, on page 245.
• SNMP Retry and Timeout Values: This is required to set up device polling and monitoring, as explained
in Configure SNMP Properties.
Caution When handling internal appliance components, wear an ESD strap and handle modules by the carrier edges
only.
Step 1 Remove the appliance from its cardboard container and save all the packaging material (in case the appliance requires
shipping in the future).
Step 2 Compare the shipment with the equipment list provided by your customer service representative. Verify that you have
all the items.
Step 3 Check for damage and report discrepancies or damage, if any, to your customer service representative immediately. Have
the following information ready:
• Invoice number of the shipper (see the packing slip)
• Model and serial number of the damaged unit
• Description of damage
• Effect of damage on the installation
Note Before you install, operate, or service a server, review the Regulatory Compliance and Safety Information for
Cisco UCS C-Series Servers for important safety information.
Warning To prevent the system from overheating, do not operate it in an area that exceeds the maximum
recommended ambient temperature of: 95°F (35°C).
Statement 1047
Warning The plug-socket combination must be accessible at all times, because it serves as the main disconnecting
device.
Statement 1019
Warning This product relies on the building’s installation for short-circuit (overcurrent) protection. Ensure that
the protective device is rated not greater than: 250 V, 15 A. Statement 1005
Warning Installation of the equipment must comply with local and national electrical codes.
Statement 1074
Warning This unit is intended for installation in restricted access areas. A restricted access area can be accessed
only through the use of a special tool, lock, and key, or other means of security.
Statement 1017
Warning This equipment must be grounded. Never defeat the ground conductor or operate the equipment in the
absence of a suitably installed ground conductor. Contact the appropriate electrical inspection authority
or an electrician if you are uncertain that suitable grounding is available.
Statement 1024
Warning For Nordic countries (Norway, Finland, Sweden and Denmark) this system must be installed in a
Restricted Access Location, where the voltage of the main ground connection of all equipment is the
same (equipotential earth) and the system is connected to a grounded electrical outlet.
Statement 328
Warning High leakage current – earth connection essential before connection to system power supply.
Statement 342
Warning This equipment must be externally grounded using a customer-supplied ground wire before power is
applied. Contact the appropriate electrical inspection authority or an electrician if you are uncertain
that suitable grounding is available.
Statement 366
Caution To ensure proper airflow, it is necessary to rack the appliances using rail kits. Physically placing the units on
top of one another or stacking without the rail kits blocks the air vents on top of the appliances, which could
result in overheating, higher fan speeds, and higher power consumption. We recommend that you mount your
appliances on rail kits when you are installing them into the rack because these rails provide the minimal
spacing required between the appliances. No additional spacing between the appliances is required when you
mount the units using rail kits.
Caution Avoid UPS models that use ferroresonant technology. These UPS models can become unstable with systems
such as the Cisco UCS, which can have substantial current-draw fluctuations because of fluctuating data traffic
patterns.
Step 1 Attach a supplied power cord to each power supply in the appliance and then attach the power cords to a grounded AC
power outlet. See Power Specifications for details.
Note For the 44 and 56-core appliance, you can use either one or both of the power supplies that come with the
appliance. For the 112-core appliance, use at least 3 of its 4 power supplies.
Wait for approximately two minutes to let the appliance boot into standby power mode during the first boot up.
The Power Status LED indicates the appliance's power status:
• Off: There is no AC power present in the appliance.
• Amber: The appliance is in standby power mode. Power is supplied only to the CIMC and some motherboard
functions.
• Green: The appliance is in main power mode. Power is supplied to all the appliance components.
For more information on these and other appliance LEDs, see Front and Rear Panels.
Step 2 Connect a USB keyboard and VGA monitor to the server, using the supplied KVM cable connected to the KVM connector
on the front panel. Alternatively, you can use the VGA and USB ports on the rear panel. You can only connect to one
VGA interface at a time.
1 After initial power-up, all the ports should have their Link Status and Link Speed LEDs
showing as off.
After network settings are configured and tested using either the Maglev Configuration
wizard (see Configure the Primary Node Using the Maglev Wizard and Configure a
Secondary Node Using the Maglev Wizard) or browser-based configuration wizard (see
Configure the Primary Node Using the Advanced Install Configuration Wizard, on page
137 and Configure a Secondary Node Using the Advanced Install Configuration Wizard,
on page 155), the Link Status and Link Speed LEDs for all cabled ports should be green.
The LED for all uncabled ports should remain unchanged.
1 After initial power-up, all the ports should have their Link Status and Link Speed LEDs
showing as off.
After network settings are configured and tested using either the Maglev Configuration
wizard (see Configure the Primary Node Using the Maglev Wizard and Configure a
Secondary Node Using the Maglev Wizard) or browser-based configuration wizard (see
Configure the Primary Node Using the Advanced Install Configuration Wizard, on page
191 and Configure a Secondary Node Using the Advanced Install Configuration Wizard,
on page 210), the Link Status and Link Speed LEDs for all cabled ports should be green.
All uncabled port LEDs should be unchanged.
If you see LEDs with colors other than those shown above, you may have a problem condition. See Front and
Rear Panels for details on the likely causes of the status. Be sure to correct any problem conditions before
proceeding to configure the appliance.
Note If you do not need to reimage your appliance, proceed to the "Appliance Configuration Overview" topic
specific to the configuration wizard you want to use:
• Appliance Configuration Overview
• Appliance Configuration Overview
• Appliance Configuration Overview
Tip To help ensure the security of your deployment, Cisco IMC prompts you to change the Cisco IMC user's
default password when you boot the appliance for the first time. To change the Cisco IMC user password
later, use the Cisco IMC GUI, as follows:
1. From the top-left corner of the GUI, click the Toggle Navigation icon ( ) and then choose Admin >
User Management.
The Local User Management tab should already be selected.
2. Check the check box for user 1, and then click Modify User.
The Modify User Details dialog box opens.
3. Check the Change Password check box.
4. Enter and confirm the new password, and then click Save.
Step 2 Make sure that the appliance's power cord is plugged in and the power is on.
Step 3 Press the Power button on the front panel to boot the appliance.
The Cisco IMC configuration utility boot screen should be displayed, as shown below.
Step 4 As soon as the boot screen is displayed, press F8 to perform Cisco IMC configuration.
The CIMC configuration utility displays the CIMC User Details screen, as shown below.
Step 5 Enter the default CIMC user password (the default on a new appliance is password) in the Enter current CIMC
Password field.
Step 6 Enter and confirm the new CIMC user password in the Enter new CIMC password and Re-Enter new CIMC
password fields.
When you press Enter after entering the new password in the Re-Enter new CIMC password field, the Cisco IMC
configuration utility displays the NIC Properties screen, as shown below.
Step 13 Log in using the Cisco IMC user ID and password you set in Step 5.
If the login is successful, your browser displays a Cisco Integrated Management Controller Chassis Summary
window similar to the one shown below.
Step 1 Log in to the appliance's Cisco IMC using the Cisco IMC IP address, user ID, and password you set in Enable Browser
Access to Cisco Integrated Management Controller.
If the login is successful, your browser displays the Cisco Integrated Management Controller Chassis Summary
window, as shown below.
Step 2 Synchronize the appliance's hardware with the Network Time Protocol (NTP) servers you use to manage your network,
as follows:
a) From the top-left corner of the Cisco IMC GUI, click the Toggle Navigation icon ( ).
b) From the Cisco IMC menu, select Admin > Networking, and then choose the NTP Setting tab.
c) Make sure that the NTP Enabled check box is checked and enter up to four NTP server host names or addresses in
the numbered Server fields, as shown in the example below.
d) Click Save Changes. Cisco IMC validates your entries and then begins to synchronize the time on the appliance's
hardware with the time on the NTP servers.
Note • Unlike the previous generation of Cisco DNA Center appliances, second-generation appliances do
not use a virtual interface card (VIC). You do not need to configure the network interface card (NIC)
that comes installed on your second-generation appliance to support high throughput in Cisco IMC,
as this is already enabled by default.
• Cisco IMC does not support NTP authentication.
Step 3 Reconfigure your switches to match the high-throughput settings on the appliance, as follows:
a) Using a Secure Shell (SSH) client, log in to the switch to be configured and enter EXEC mode at the switch prompt.
b) Configure the switch port.
On a Cisco Catalyst switch, enter the following commands. For example:
MySwitch#Config terminal
MySwitch(config)#interface tengigabitethernet 1/1/3
MySwitch(config-if)#switchport mode access
MySwitch(config-if)#switchport access vlan 99
MySwitch(config-if)#speed auto
MySwitch(config-if)#duplex full
MySwitch(config-if)#mtu 1500
MySwitch(config-if)#no shut
MySwitch(config-if)#end
MySwitch(config)#copy running-config startup-config
On a Cisco Nexus switch, enter the following commands to disable Link Layer Discovery Protocol (LLDP) and
priority flow control (PFC). For example:
N7K2# configure terminal
N7K2(config)# interface eth 3/4
N7K2(config-if)# no priority-flow-control mode auto
N7K2(config-if)# no lldp transmit
N7K2(config-if)# no lldp receive
c) Run the show interface tengigabitethernet portID command and verify that the port is connected, running, and has
the correct MTU, duplex, and link-type settings in the command output. For example:
MySwitch#show interface tengigabitethernet 1/1/3
TenGigabitEthernet1/1/3 is up, line protocol is up (connected)
Hardware is Ten Gigabit Ethernet, address is XXXe.310.8000 (bia XXX.310.8000)
MTU 1500 bytes, BW 10000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive not set
Full-duplex, 10GB/s, link type is auto, media type is SFP-10Gbase-SR
d) Run the show run interface tengigabitethernet portID command to configure the switch ports where the cables from
the Intel X710-DA2 NIC ports are connected. For example:
MySwitch#show run interface tengigabitethernet 1/1/3
Building configuration...
Current configuration : 129 bytes
! interface TenGigabitEthernet1/1/3
switchport access vlan 99
ip device tracking maximum 10
end
MySwitch#
e) Run the show mac address-table interface tengigabitethernet portID command and verify the MAC address from the
command output. For example:
MySwitch#show mac address-table interface tengigabitethernet 1/1/3
Mac Address Table
––––––––––––––––––––––––––––––––––––––––––--
Vlan Mac Address Type Ports
––-- ––––––––––- –––- –––--
99 XXXe.3161.1000 DYNAMIC Te1/1/3
Total Mac Addresses for this criterion: 1
MySwitch#
Step 4 In the Configured Boot Mode drop-down list, confirm that Legacy (the default mode) is set.
a) From the top-left corner of the Cisco IMC GUI, click the Toggle Navigation icon ( ).
b) From the Cisco IMC menu, choose Compute > BIOS > Configure Boot Order.
Do not change the boot mode to UEFI. When this mode is set, your Cisco DNA Center appliance's interfaces may not
be pingable.
What to do next
When this task is complete, do one of the following:
• If you need to reinstall Cisco DNA Center software before you configure your appliance, see Reimage
the Appliance.
• If you are ready to configure your appliance, proceed to the "Appliance Configuration Overview" topic
specific to the configuration wizard you want to use:
• Appliance Configuration Overview
• Appliance Configuration Overview
Note Both single-node and three-node Cisco DNA Center clusters support NIC bonding.
• Active-Backup mode: By default, this is the bonding mode that's configured for your appliance's interfaces
when this feature is enabled on your appliance. It enables high availability (HA) for the two interfaces
that Cisco DNA Center has grouped together. When the interface that's currently active goes down, the
other interface takes its place and becomes active.
Note When this mode is enabled on an interface that supports both 1-Gbps and 10-Gbps
throughput, Cisco DNA Center automatically sets the throughput to 1-Gbps.
• LACP mode: When selected, the two interfaces that Cisco DNA Center has grouped together share the
same speed and duplex settings. This provides load balancing and higher bandwidth for the interfaces.
In order to enable this mode, the following items must first be in place:
• The Linux utility ethtool must support the base drivers that are used to retrieve the speed and duplex
mode of each interface.
• The switch that is connected to the Enterprise port must support dynamic interface aggregation.
• After you enable LACP on the switch, ensure that you have set the LACP mode to active (which
places the switch port connected to your appliance into an active negotiating state, in which the port
initiates negotiations with remote ports by sending LACP packets) and the LACP rate to fast (which
changes the rate at which the LACP control packets are sent to an LACP-supported interface from
the default every 30 seconds to once every second).
Note You can only enable LACP mode on your appliance's Enterprise and Intracluster
interfaces. The Management and Internet Access interfaces only support
Active-Backup mode.
Before you use NIC bonding in your production environment, you should do the following:
• Confirm that your appliance supports this feature. See Appliance Support, on page 68.
• If the Intel X710-DA4 NIC that shipped with your appliance is currently disabled, you need to enable it
in order to make use of NIC bonding (see Enable NIC on an Upgraded Appliance, on page 68).
• Determine where the secondary ports are located on your appliance's rear panel. See Front and Rear
Panels, on page 5.
• View the recommended appliance–switch cabling. See Interface Cable Connections, on page 24.
Appliance Support
All second-generation Cisco DNA Center appliances support NIC bonding:
• 44-core appliance: Cisco part number DN2-HW-APL
• 44-core promotional appliance: Cisco part number DN2-HW-APL-U
• 56-core appliance: Cisco part number DN2-HW-APL-L
• 56-core promotional appliance: Cisco part number DN2-HW-APL-L-U
• 112-core appliance: Cisco part number DN2-HW-APL-XL
• 112-core promotional appliance: Cisco part number DN2-HW-APL-XL-U
Step 1 Confirm that your appliance has the Intel X710-DA4 NIC installed.
a) Log in to the appliance's Cisco IMC.
b) In the Summary window's Server Properties area, confirm that the following values are set:
• PID: DN2-HW-APL for a 44-core appliance, DN2-HW-APL-L for a 56-core appliance, or DN2-HW-APL-XL
for a 112-core appliance (see the following example).
• BIOS Version: This value should start with either C220M5 for a 44 and 56-core appliance or C480M5 for a
112-core appliance (see the following example).
d) In the Network Adapters table, confirm that the Intel X710-DA4 Quad Port network adapter is listed for one of the
following slots:
• For a 44 or 56-core appliance, PCIe Slot 2.
• For a 112-core appliance, PCIe Slot 12 (see the following example).
b) In the LOM and PCIe Slots Configuration tab, choose PCIE Link Speed Configuration.
c) In the PCIE Link Speed Configuration tab, scroll down to PCIE SlotID: 12's Link Enable option and then press
Enter.
d) Choose Enable, then press ENTER.
Your screen should look like the following example:
e) Press the ESC key twice to return to the main BIOS menu, then open the Save & Exit tab.
f) Choose the Save Changes and Reset option, then press Enter.
Your appliance reboots and opens the configuration wizard. Proceed with the configuration of your appliance.
Important After you have enabled your appliance's NIC, if you reset your appliance to the default settings in Cisco
IMC ( > Admin > Utilities > Reset to factory Default), you will need to complete this procedure
again.
Step 6 Complete the configuration wizard to finalize the use of the Intel X710-DA4 NIC on your appliance, as described in
Reconfigure the Appliance Using the Configuration Wizard, on page 250.
Step 1 Download the Cisco DNA Center ISO image and verify that it is a genuine Cisco image.
See Verify the Cisco DNA Center ISO Image.
Step 2 Create a bootable USB drive that contains the Cisco DNA Center ISO image.
See Create a Bootable USB Flash Drive.
Step 3 Reinitialize the virtual drives that are managed by your appliance’s RAID controller.
See Reinitialize the Virtual Drives on a Cisco DNA Center Appliance, on page 78.
Step 4 Reinstall Cisco DNA Center onto your appliance.
See Install the Cisco DNA Center ISO Image.
Step 1 Download the Cisco DNA Center ISO image (.iso) from the location specified by Cisco.
Step 2 Download the Cisco public key (cisco_image_verification_key.pub) for signature verification from the location specified
by Cisco.
Step 3 Download the secure hash algorithm (SHA512) checksum file for the ISO image from the location specified by Cisco.
Step 4 Obtain the ISO image's signature file (.sig) from Cisco support through email or by download from the secure Cisco
website (if available).
Step 5 (Optional) Perform an SHA verification to determine whether the ISO image is corrupted due to a partial download.
Run one of the following commands (depending upon your operating system):
• On a Linux system: sha512sum ISO-image-filename
• On a Mac system: shasum -a 512 ISO-image-filename
Microsoft Windows does not include a built-in checksum utility, but you can use the certutil tool:
certutil -hashfile <filename> sha256 | md5
For example:
certutil -hashfile D:\Customers\FINALIZE.BIN sha256
On Windows, you can also use the Windows PowerShell to generate the digest. For example:
PS C:\Users\Administrator> Get-FileHash -Path D:\Customers\FINALIZE.BIN
Algorithm Hash Path
SHA256 B84B6FFD898A370A605476AC7EC94429B445312A5EEDB96166370E99F2838CB5 D:\Customers\FINALIZE.BIN
Compare the output of the command you run to the SHA512 checksum file that you downloaded. If the command output
does not match, download the ISO image again and run the appropriate command a second time. If the output still does
not match, contact Cisco support.
Step 6 Verify that the ISO image is genuine and from Cisco by verifying its signature:
openssl dgst -sha512 -verify cisco_image_verification_key.pub -signature signature-filename ISO-image-filename
Note This command works in both MAC and Linux environments. For Windows, you need to download and install
OpenSSL (available here) if you have not already done so.
If the ISO image is genuine, running this command should display a Verified OK message. If this message fails to appear,
do not install the ISO image and contact Cisco support.
Step 7 After confirming that you have downloaded a Cisco ISO image, create a bootable USB drive that contains the Cisco DNA
Center ISO image. See Create a Bootable USB Flash Drive.
Note Do not use the Rufus utility to burn the Cisco DNA Center ISO image. Use only Etcher, the Linux CLI, or
the Mac CLI.
Using Etcher
Step 1 Download and install Etcher (Version 1.3.1 or later), an open-source freeware utility that allows you to create a bootable
USB drive on your laptop or desktop.
Linux, macOS, and Windows versions of Etcher are currently available. You can download a copy at
https://www.balena.io/etcher/.
Note Use only the Windows version of Etcher on machines running Windows 10, as there are known compatibility
issues with older versions of Windows.
Step 2 From the machine on which you installed Etcher, connect a USB drive and then start Etcher.
Step 3 In the top-right corner of the window, click and verify that the following Etcher settings are set:
• Auto-unmount on success
• Validate write on success
The name of the USB drive you connected should be listed under the drive icon ( ). If it is not:
a. Click Select drive.
b. Click the radio button for the correct USB drive, and then click Continue.
Step 7 Click Flash! to copy the ISO image to the USB drive.
Etcher configures the USB drive as a bootable drive with the Cisco DNA Center ISO image installed.
Step 1 Verify that your USB flash drive is recognized by your machine:
c) Confirm that an sdd partition (which indicates the presence of a USB flash drive) is listed.
Step 2 Burn the Cisco DNA Center ISO image you downloaded previously onto your USB flash drive: time sudo dd
if=/data/tmp/ISO-image-filename of=/dev/flash-drive-partition bs=4M && sync status=progress
For example, to create a bootable USB drive using an ISO image named CDNAC-SW-1.330.iso, you would run the
following command: time sudo dd if=/data/tmp/CDNAC-SW-1.330.iso of=/dev/sdd bs=4M && sync status=progress
Step 1 Determine the disk partition associated with your USB flash drive:
a) Open a Terminal window and run the following command: diskutil list
The command lists the disk partitions that are currently configured on your machine.
b) Insert a flash drive into your machine's USB port and run the diskutil list command a second time.
The partition that was not listed the first time you ran this command corresponds to your flash drive. For example,
let's assume that your flash drive's partition is /dev/disk2.
Step 3 Using the Cisco DNA Center ISO image you downloaded previously, create a disk image: hdiutil convert -format
UDRW -o Cisco-DNA-Center-version ISO-image-filename
Continuing our example, let's assume that you are working with a Cisco DNA Center ISO image named
CDNAC-SW-1.330.iso. You would run the following command, which creates a macOS disk image named CDNAC-1.330.dmg:
hdiutil convert -format UDRW -o CDNAC-1.330 CDNAC-SW-1.330.iso
Important Ensure that the ISO image does not reside on a Box partition.
Step 4 Create a bootable USB drive: sudo dd if=macOS-disk-image-filename of=flash-drive-partition bs=1m status=progress
Continuing our example, you would run the following command: sudo dd if=CDNAC-1.330.dmg of=/dev/disk2 bs=1m
status=progress
The ISO image is about 18 GB in size, so this can take around an hour to complete.
Step 1 Log in to the appliance's Cisco IMC using the Cisco IMC IP address, user ID, and password you set in Enable Browser
Access to Cisco Integrated Management Controller.
Step 2 From the top-left corner of the Cisco IMC GUI, click the Toggle Navigation icon ( ).
Step 3 From the Cisco IMC menu, choose Storage > Cisco 12G Modular Raid Controller.
Step 4 Click the Virtual Drive Info tab.
Step 5 Check the check box for the first virtual drive that's listed (drive number 0), then click Initialize.
Step 6 From the Initialize Type drop-down list, choose Full Initialize.
Step 7 Click Initialize VD.
Step 8 Repeat Step 5 through Step 7 for the appliance’s other virtual drives, but choose Fast Initialize. (Only the first virtual
drive requires full initialization. The second and third virtual drives don’t require full initialization.)
Step 1 Connect the bootable USB drive with the Cisco DNA Center ISO image to the appliance.
Step 2 Log in to Cisco IMC and start a KVM session.
Step 3 Power on or power cycle the appliance:
• Choose Power > Power On System if the appliance is not currently running.
• Choose Power > Power Cycle System (cold boot) if the appliance is already running.
Step 4 In the resulting pop-up window, click Yes to acknowledge that you are about to execute a server control action.
Step 5 When the Cisco logo appears, either press the F6 key or choose Macros > User Defined Macros > F6 from the KVM
menu.
The boot device selection menu appears.
The installer reboots and opens the wizard's welcome screen. Depending on whether you are going to configure a primary
or secondary cluster node, proceed to Step 4 in either Configure the Primary Node Using the Maglev Wizard, on page
81 or Configure a Secondary Node Using the Maglev Wizard, on page 103.
If you are configuring the installed appliance as a secondary node for an existing cluster that already has a
primary node, follow the steps described in Configure a Secondary Node Using the Maglev Wizard, on page
103 instead.
Note Ensure that all of the IP addresses you enter while completing this procedure are valid IPv4 addresses with
valid IPv4 netmasks. Also make sure that the addresses and their corresponding subnets do not overlap. Service
communication issues can result if they do.
Important Before you configure the appliances in a three-node cluster, ensure that you have logged out of those appliances.
Otherwise, the Quick Start workflow (which you complete to discover your network's devices and enable
telemetry) will not start after you have configured your cluster's appliances and log in to Cisco DNA Center
for the first time.
Step 1 Point your browser to the Cisco IMC IP address you set during the Cisco IMC GUI configuration you performed, and
log in to the Cisco IMC GUI as the Cisco IMC user (see Enable Browser Access to Cisco Integrated Management
Controller).
After successful login, the appliance displays the Cisco Integrated Management Controller Chassis Summary
window, with a hyperlinked menu at the top of the window, as shown below.
Step 2 From the hyperlinked menu, choose Launch KVM and then select either Java based KVM or HTML based KVM.
If you select Java-based KVM, you will need to launch the Java startup file from your browser or file manager in
order to view the KVM console in its own window. If you select HMTL-based KVM, it launches the KVM console
in a separate window or tab automatically.
Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and
respond to the Maglev Configuration wizard prompts.
Step 3 With the KVM displayed, reboot the appliance by making one of the following selections:
• In the main Cisco IMC GUI browser window: Choose Host Power > Power Cycle, and switch to the KVM
console to continue.
• In the KVM console: Choose Power > Power Cycle System (cold boot).
If you are asked to confirm your choice to reboot the appliance, click OK.
After displaying reboot messages, the KVM console displays the Maglev Configuration wizard welcome screen.
Step 4 Click Start a Cisco DNA Center Cluster to begin configuring the primary node.
You will not be able to change any of these settings, so choose this option only if you want to use them.
Important This option is only available if you are configuring a new Cisco DNA Center appliance. If you are
reimaging your appliance, the wizard proceeds with the Start configuration of DNAC in advanced
mode option selected.
• Start configuration of DNAC in advanced mode: Choose this option to configure an appliance that doesn't use
one or more of the default settings listed in the previous bullet. Also choose this option if you want to use IPv6
addressing on your appliance.
Step 7 (Optional) Do the following to enable Layer 2 portchannel mode (with VLAN tagging) for the appliance. This will
create a single bonded interface that connects to your network using both the primary and secondary instance of your
appliance's Enterprise interface. After making your selections, click next>> to proceed.
a) Choose the VLAN mode option to enable dot1q/VLAN trunking and convert your appliance's Enterprise, Cluster,
Management, and Internet interfaces into VLAN subinterfaces that reside on the bonded interface (as illustrated in
the following figure). By default, this interface operates in Active-Backup mode (which enables HA).
b) If you want this interface to operate in LACP mode instead (which enables load balancing and higher bandwidth),
you must also choose the LACP option.
c) When you enter the settings for your appliance's Enterprise interface, ensure that you enter a unique VLAN ID for
the bonded interface in the VLAN ID of Interface field.
Important • The bonded interface feature is not commonly used. Only enable it if it's required by your Cisco DNA
Center deployment. If you just want to enable NIC bonding, you can do so in the next two wizard
screens.
• This feature assumes that one of the following deployment types are used:
• A deployment where an appliance's Enterprise and Cluster interfaces are configured.
• A deployment where an appliance's Enterprise, Cluster, and Management interfaces are configured.
The wizard discovers all of the ports on the appliance and presents them to you one by one, in separate screens, in the
following order:
a. (Required) 10-Gbps Enterprise Port—Network Adapter #1
b. (Required) 10-Gbps Cluster Port—Network Adapter #2
c. (Optional) 1-Gbps/10-Gbps Management Port—Network Adapter #3
d. (Optional) 1-Gbps/10-Gbps Internet Port—Network Adapter #4
If the wizard fails to display either or both of the Enterprise and Cluster ports during the course of configuration, it
might indicate that these ports are nonfunctional or disabled. These two ports are required for Cisco DNA Center
functionality. If you discover that they are nonfunctional, choose cancel to exit the configuration wizard immediately.
Be sure that you have completed all of the steps provided in Execute Preconfiguration Checks before resuming the
configuration or contacting the Cisco Technical Assistance Center (for more information, see the "Get Assistance from
the Cisco TAC" topic in the Release Notes document).
Step 8 The wizard first presents the 10-Gbps Enterprise port as NETWORK ADAPTER #1. As explained in Interface Cable
Connections, this is a required port used to link the appliance to the enterprise network. Apply the host IP address,
netmask, and other values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required
Configuration Information for the values to enter).
Enter the configuration values for NETWORK ADAPTER #1, as shown in the table below.
Table 19: Primary Node Entries for Network Adapter #1: 10-Gbps Enterprise Port
Host IPv4/IPv6 Address field Enter the IP address for the Enterprise port. This is required.
Default Gateway IPv4/IPv6 Enter a default gateway IP address to use for the port.
Address field
Important Ensure that you enter a default gateway IP address for at least one
of your appliance's interfaces. Otherwise, you will not be able to
complete the configuration wizard.
IPv4/IPv6 DNS Servers field Enter the IP address of the preferred DNS server. If you are entering multiple DNS
servers, separate the IP addresses in the list with spaces.
Important For each appliance in your cluster, configure a maximum of three
DNS servers. Problems can occur if you configure more than three
DNS servers for an appliance.
IPv4/IPv6 Static Routes field Enter one or more static routes in the following format, separated by spaces:
<network>/<netmask>/<gateway>. This is usually required on the Cisco DNA
Center Management port only.
Vlan ID of Interface field Enter the VLAN ID for the bonded interface you enabled in the previous step. If
you didn't enable it, this field will not be displayed.
Cluster Link field Leave this field blank. It is required on the Cluster port only.
For more information about Cisco DNA Center's implementation of NIC bonding,
see NIC Bonding Overview, on page 67.
Note This field is displayed if you didn't choose any of the options in the
previous step.
After you finish entering the configuration values, click next>> to proceed. The wizard validates the values you entered
and issues an error message if any are incorrect. If you receive an error message, check that the value you entered is
correct, then reenter it. If needed, click <<back to reenter it.
Step 9 After successful validation of the Enterprise port values you entered, the wizard presents the 10-Gbps Cluster port and
presents it as NETWORK ADAPTER #2. As explained in Interface Cable Connections, this port is used to link the
appliance to the cluster, so apply the host IP address, netmask, and other values that are appropriate for this purpose
(see Required IP Addresses and Subnets and Required Configuration Information for the values to enter).
Enter the configuration values for NETWORK ADAPTER #2, as shown in the table below.
Table 20: Primary Node Entries for Network Adapter #2: 10-Gbps Cluster Port
Host IPv4/IPv6 address field Enter the IP address for the Cluster port. This is required. Note that you cannot
change the address of the Cluster port later.
Note If you selected the Start using DNAC pre manufactured cluster
option previously, 169.254.6.66 will already be set in this field and
you will not be able to enter a different address.
• If you selected IPv6 addressing, enter the prefix length (in bits). Valid values
range from 10 through 127.
Default Gateway IPv4/IPv6 Enter a default gateway IP address to use for the port.
address field
Important Ensure that you enter a default gateway IP address for at least one
of your appliance's interfaces. Otherwise, you will not be able to
complete the configuration wizard.
IPv4/IPv6 DNS Servers field Enter the IP address of the preferred DNS server. If you are entering multiple DNS
servers, separate the IP addresses in the list with spaces.
Important For each appliance in your cluster, configure a maximum of three
DNS servers. Problems can occur if you configure more than three
DNS servers for an appliance.
IPv4/IPv6 Static Routes field Enter one or more static routes in the following format, separated by spaces:
<network>/<netmask>/<gateway>. This is usually required on the Management
port only.
Cluster Link field Check the check box to set this port as the link to a Cisco DNA Center cluster.
This is required on the Cluster port only.
For more information about Cisco DNA Center's implementation of NIC bonding,
see NIC Bonding Overview, on page 67.
Note This field is displayed if you didn't choose any of the options in Step
7.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens. The wizard validates and applies your network adapter configurations.
Step 10 After successful validation of the Cluster port values you entered, the wizard presents the 1-Gbps/10-Gbps Management
port and presents it as NETWORK ADAPTER #3. As explained in Interface Cable Connections, this port is used to
access the Cisco DNA Center GUI from your management network. Apply the host IP address, netmask, and other
values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required Configuration
Information for the values to enter).
Enter the configuration values for NETWORK ADAPTER #3, as shown in the table below.
Table 21: Primary Node Entries for Network Adapter #3: 1-Gbps/10-Gbps Management Port
Host IPv4/IPv6 address field Enter the IP address for the Management Port. This is required only if you are
using this port to access the Cisco DNA Center GUI from your management
network; otherwise, you can leave it blank.
IPv4 Netmask/IPv6 Prefix Length Do one of the following if you entered an IP address:
field
• If you selected IPv4 addressing, enter the netmask for the port's IP address.
This is required.
• If you selected IPv6 addressing, enter the prefix length (in bits). Valid values
range from 10 through 127.
Default Gateway IPv4/IPv6 Enter a default gateway IP address to use for the port.
address field
Important Ensure that you enter a default gateway IP address for at least one
of your appliance's interfaces. Otherwise, you will not be able to
complete the configuration wizard.
IPv4/IPv6 DNS Servers field Enter the IP address of the preferred DNS server. If you are entering multiple DNS
servers, separate the IP addresses in the list with spaces.
Important • For NTP, ensure port 123 (UDP) is open between Cisco DNA
Center and your NTP server.
• For each appliance in your cluster, configure a maximum of
three DNS servers. Problems can occur if you configure more
than three DNS servers for an appliance.
IPv4/IPv6 Static Routes field Enter one or more static routes in the following format, separated by spaces:
<network>/<netmask>/<gateway>.
Cluster Link field Leave this field blank. It is required on the Cluster port only.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens. The wizard validates and applies your network adapter configurations.
Step 11 After successful validation of the Management port values you entered, the wizard presents the 1-Gbps/10-Gbps Internet
port as NETWORK ADAPTER #4. As explained in Interface Cable Connections, this is an optional port used to link
the appliance to the Internet when you cannot do so through the 10-Gbps Enterprise port. Apply the host IP address,
netmask, and other values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required
Configuration Information for the values to enter).
Enter the configuration values for NETWORK ADAPTER #4, as shown in the table below.
Table 22: Primary Node Entries for Network Adapter #4: 1-Gbps/10-Gbps Internet Port
Host IPv4/IPv6 address field Enter the IP address for the Internet port. This is required only if you are using
the Internet port for internet connection; otherwise, you can leave it blank.
IPv4 Netmask/IPv6 Prefix Length Do one of the following if you entered an IP address:
field
• If you selected IPv4 addressing, enter the netmask for the port's IP address.
This is required.
• If you selected IPv6 addressing, enter the prefix length (in bits). Valid values
range from 10 through 127.
Default Gateway IPv4/IPv6 Enter a default gateway IP address to use for the Internet port.
address field
Important Ensure that you enter a default gateway IP address for at least one
of your appliance's interfaces. Otherwise, you will not be able to
complete the configuration wizard.
IPv4/IPv6 DNS Servers field Enter the IP address of the preferred DNS server. If you are entering multiple DNS
servers, separate the IP addresses in the list with spaces.
Important For each appliance in your cluster, configure a maximum of three
DNS servers. Problems can occur if you configure more than three
DNS servers for an appliance.
IPv4/IPv6 Static Routes field Enter one or more static routes in the following format, separated by spaces:
<network>/<netmask>/<gateway>. This is usually required on the Management
port only.
Cluster Link field Leave this field blank. It is required on the Cluster port only.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens. The wizard validates and applies your network adapter configurations.
Step 12 After the network adapter configuration is complete, the wizard prompts you to enter configuration values for the
NETWORK PROXY that you are using, as shown below.
Enter the configuration values for the NETWORK PROXY, as shown in the table below.
HTTPS Proxy field Enter the URL or host name of an HTTPS network proxy used to access the
Internet.
Note • Connection from Cisco DNA Center to the HTTPS proxy is
supported only through HTTP in this release.
• If you enter an IPv6 URL that contains a port number, enclose
the IP address portion of the URL in square brackets. In this
example, 443 is the port number:
http://[2001:db8:85a3:8d3:1319:8a2e:370:7348]:443/
HTTPS Proxy Username field Enter the user name used to access the network proxy. If no proxy login is required,
leave this field blank.
HTTPS Proxy Password field Enter the password used to access the network proxy. If no proxy login is required,
leave this field blank.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens.
Step 13 After network proxy configuration completes, the wizard prompts you to enter virtual IP addresses for the primary
node, in MAGLEV CLUSTER DETAILS (as shown below).
Enter a space-separated list of the virtual IP addresses used for traffic between the cluster and your network. This is
required for both three-node clusters and single-node clusters that will be converted into a three-node cluster in the
future. If you have a single-node cluster setup and plan to stick with it, skip this step and proceed to the next step.
Important You must enter one virtual IP address for each configured network interface. You will not be able to
complete the wizard unless you do so. These addresses are tied to the cluster link's status, which must be
in the UP state.
You also have the option to specify the fully qualified domain name (FQDN) for your cluster. Cisco DNA Center uses
this domain name to do the following:
• It uses this hostname to access your cluster’s web interface and the Representational State Transfer (REST) APIs
used by devices in the enterprise network that Cisco DNA Center manages.
• In the Subject Alternative Name (SAN) field of Cisco DNA Center certificates, it uses the FQDN to the define
the Plug and Play server that should be used for device provisioning.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens.
Step 14 After you have entered the cluster details, the wizard prompts you to enter USER ACCOUNT SETTINGS values, as
shown below.
Enter the values for USER ACCOUNT SETTINGS, as shown in the table below.
Linux Password field Enter a Linux password for the maglev user that's a minimum of 8 characters long.
Re-enter Linux Password field Confirm the Linux password by entering it a second time.
Password Generation Seed field If you do not want to create the Linux password yourself, enter a seed phrase in
this field and then press <Generate Password> to generate the password.
Auto Generated Password field (Optional) The seed phrase appears as part of a random and secure password. If
desired, you can either use this password "as is", or you can further edit this
auto-generated password.
Press <Use Generated Password> to save the password.
Administrator Password field Enter a password for the default admin superuser, used to log in to Cisco DNA
Center for the first time.
Note the following points:
• If you enabled FIPS mode earlier in the wizard, ensure that this password is
at least 8 characters long.
• If you chose the Start using DNAC pre manufactured cluster option
previously, the default password (maglev1@3) has already been set for the
appliance and cannot be changed in the configuration wizard. As a result,
this and the following field are not displayed in this screen.
Re-enter Administrator Password Confirm the administrator password by entering it a second time.
field
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens.
Step 15 After you have entered the user account details, the wizard prompts you to enter NTP SERVER SETTINGS values.
Enter the values for NTP SERVER SETTINGS, as shown in the table below.
NTP Servers field Enter one or more NTP server addresses or hostnames,
separated by spaces. At least one NTP address or hostname
is required. For a production deployment, we recommend
that you configure a minimum of three NTP servers.
NTP Authentication check box To enable the authentication of your NTP server before
it's synchronized with Cisco DNA Center, check this check
box and then enter the following information:
• The NTP server's key ID. Valid values range between
1 and 4294967295 (2^32-1).
This value corresponds to the key ID that's defined
in the NTP server's key file.
• The SHA-1 key value associated with the NTP
server's key ID. This 40-character hex string resides
in the NTP server's key file.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens. The wizard validates and applies your NTP server configuration.
Step 16 After you have specified the appropriate NTP servers, the wizard prompts you to enter MAGLEV ADVANCED
SETTINGS values, as shown below.
Note If you chose the Start using DNAC pre manufactured cluster option previously, the default Container
and Cluster subnets have already been set for the appliance and cannot be changed in the configuration
wizard. As a result, you will not see the following wizard screen. Proceed to the next step.
Enter the configuration values for MAGLEV ADVANCED SETTINGS, as shown in the table below.
Container Subnet field A dedicated, non-routed IP subnet that Cisco DNA Center uses to manage internal
services. By default, this is already set to 169.254.32.0/20, and we recommend
that you use this subnet. If you choose to enter another subnet, ensure that it does
not conflict with or overlap any other subnet used by the Cisco DNA Center internal
network or an external network. For more information, see the Container Subnet
description in Required IP Addresses and Subnets, on page 29.
Cluster Subnet field A dedicated, non-routed IP subnet that Cisco DNA Center uses to manage internal
cluster services. By default, this is already set to 169.254.48.0/20, and we
recommend that you use this subnet. If you choose to enter another subnet, ensure
that it does not conflict with or overlap any other subnet used by the Cisco DNA
Center internal network or an external network. For more information, see the
Cluster Subnet description in Required IP Addresses and Subnets, on page 29.
Enable Intracluster IPSec check Check to enable IPsec connections between the nodes in a 3-node high availability
box (HA) cluster.
When you are finished, click next>> to proceed. Correct validation errors, if any, as you did in previous screens.
Step 17 After you have entered the Maglev advanced settings, a final message appears, stating that the wizard is ready to apply
the configuration (as shown below).
What to do next
• If you are deploying this appliance in standalone mode only, perform the first-time setup: First-Time
Setup Workflow.
• If you are deploying this appliance as the primary node in a cluster, configure the second and third
installed appliances in the cluster: Configure a Secondary Node Using the Maglev Wizard, on page 103.
• The Cisco Wide Area Bonjour application does not support FIPS mode. As a result, you cannot install
this application from either the Cisco DNA Center GUI or CLI.
• When FIPS mode is enabled, some of the functions related to Endpoint Analytics are unavailable in the
Cisco DNA Center GUI.
• FIPS mode affects the export and import of map archives.
When FIPS mode is enabled:
• Exported map archives are unencrypted.
• Only unencrypted map archives can be imported.
Important In order to build a three-node cluster, the same version of the System package must be installed on your three
Cisco DNA Center appliances. Otherwise, unexpected behavior and possible downtime can occur.
Note Ensure that all of the IP addresses you enter while completing this procedure are valid IPv4 addresses with
valid IPv4 netmasks. Also make sure that the addresses and their corresponding subnets do not overlap. Service
communication issues can result if they do.
Important Before you configure the appliances in a three-node cluster, ensure that you have logged out of those appliances.
Otherwise, the Quick Start workflow (which you complete to discover your network's devices and enable
telemetry) will not start after you have configured your cluster's appliances and log in to Cisco DNA Center
for the first time.
When joining each new secondary node to the cluster, you must specify the first host in the cluster as the
primary node. Note the following when joining secondary nodes to a cluster:
• Be sure to join only a single node to the cluster at a time. Do not attempt to add multiple nodes at the
same time, because this results in unpredictable behavior.
• Before adding a new node to the cluster, be sure that all installed packages are deployed on the primary
node. You can check this by using Secure Shell to log in to the primary node's Cisco DNA Center
Management port as the Linux User (maglev) and then running the command maglev package status.
All installed packages should appear in the command output as DEPLOYED. In the following example, a
few packages were not installed, such as the application-policy and sd-access packages. They are the
only packages whose status is NOT_DEPLOYED. Your package status should look similar to this before
configuring a secondary node.
• Expect some service downtime during the cluster attachment process for each secondary node. Services
will need to be redistributed across the nodes and the cluster will be down for periods of time during that
process.
• Configured Cisco IMC browser access on both secondary appliances, as described in Enable Browser
Access to Cisco Integrated Management Controller.
• Checked that both the secondary appliances' ports and the switches they use are properly configured (as
described in Execute Preconfiguration Checks).
• Confirmed that you are using a compatible browser. For a list of compatible browsers, see the Release
Notes document for the version of Cisco DNA Center you are installing.
• Enabled ICMP on the firewall between Cisco DNA Center and both the default gateway and the DNS
server you specify in the following procedure. The Maglev Configuration wizard uses ping to verify the
gateway and DNS server you specify. This ping might get blocked if a firewall is in place and ICMP is
not enabled on that firewall. When this happens, you will not be able to complete the wizard.
Step 1 Point your browser to the Cisco IMC IP address you set during the Cisco IMC GUI configuration you performed, and
log in to the Cisco IMC GUI as the Cisco IMC user (see Enable Browser Access to Cisco Integrated Management
Controller).
After successful login, the appliance displays the Cisco Integrated Management Controller Chassis Summary
window, with a hyperlinked menu at the top of the window, as shown below.
Step 2 From the hyperlinked menu, choose Launch KVM and then select either Java based KVM or HTML based KVM.
If you select Java-based KVM, you will need to launch the Java startup file from your browser or file manager in
order to view the KVM console in its own window. If you select HMTL-based KVM, it launches the KVM console
in a separate window or tab automatically.
Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and
respond to the Maglev Configuration wizard prompts.
Step 3 With the KVM displayed, reboot the appliance by choosing one of the following options:
• In the main Cisco IMC GUI browser window: Choose Host Power > Power Cycle, and switch to the KVM
console to continue.
• In the KVM console: Choose Power > Power Cycle System (cold boot).
If you are asked to confirm your choice to reboot the appliance, click OK.
After displaying reboot messages, the KVM console displays the Maglev Configuration wizard welcome screen.
Step 4 Click Join a Cisco DNA Center Cluster to begin configuring the secondary node.
The screen updates.
Step 6 (Optional) To set Layer 2 LACP portchannel mode (with VLAN tagging) for the appliance, choose both the VLAN
mode and LACP options. After making your selection, click next>> to proceed.
Important The VLAN mode option enables dot1q/VLAN trunking, while the LACP option enables the NIC bonding
mode that provides load balancing and higher bandwidth for your appliance's Enterprise and Intracluster
interfaces. This pairing of options is not commonly used, so only choose both if they're required by your
Cisco DNA Center deployment. If you only want to enable NIC bonding, you can do so in the next two
wizards screens.
The wizard discovers all of the ports on the appliance and presents them to you one by one, in separate screens, in the
following order:
a. (Required) 10-Gbps Enterprise Port—Network Adapter #1
b. (Required) 10-Gbps Cluster Port—Network Adapter #2
c. (Optional) 1-Gbps/10-Gbps Management Port—Network Adapter #3
d. (Optional) 1-Gbps/10-Gbps Internet Port—Network Adapter #4
If the wizard fails to display either or both of the Enterprise and Cluster ports during the course of configuration, it
might indicate that these ports are nonfunctional or disabled. These two ports are required for Cisco DNA Center
functionality. If you discover that they are nonfunctional, choose cancel to exit the configuration wizard immediately.
Be sure that you have completed all of the steps provided in Execute Preconfiguration Checks before resuming the
configuration or contacting the Cisco Technical Assistance Center (for more information, see the "Get Assistance from
the Cisco TAC" topic in the Release Notes document).
Step 7 The wizard first presents the 10-Gbps Enterprise port as NETWORK ADAPTER #1. As explained in Interface Cable
Connections, this is a required port used to link the appliance to the enterprise network. Apply the host IP address,
netmask, and other values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required
Configuration Information for the values to enter).
Enter the configuration values for NETWORK ADAPTER #1, as shown in the table below.
Table 26: Secondary Node Entries for Network Adapter #1: 10-Gbps Enterprise Port
Host IPv4/IPv6 Address field Enter the IP address for the Enterprise port. This is
required.
IPv4 Netmask/IPv6 Prefix Length field Do one of the following if you entered an IP address:
• If you selected IPv4 addressing, enter the netmask
for the port's IP address. This is required.
• If you selected IPv6 addressing, enter the prefix length
(in bits). Valid values range from 10 through 127.
Default Gateway IPv4/IPv6 address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able to
complete the configuration wizard.
IPv4/IPv6 DNS Servers field Enter the IP address of the preferred DNS server. If you
are entering multiple DNS servers, separate the IP
addresses in the list with spaces.
Important For each appliance in your cluster, configure
a maximum of three DNS servers. Problems
can occur if you configure more than three
DNS servers for an appliance.
IPv4/IPv6 Static Routes field Enter one or more static routes in the following format,
separated by spaces: <network>/<netmask>/<gateway>.
This is usually required on the Cisco DNA Center
Management port only.
Vlan Id of Interface field Enter the VLAN ID that will be tagged over the LACP
link to be created for the appliance you are configuring.
Note This field is displayed only if you set Layer
2 LACP portchannel mode for the appliance
by choosing both options in the previous step.
Cluster Link field Leave this field blank. It is required on the Cluster port
only.
After you finish entering the configuration values, click next>> to proceed. The wizard validates the values you entered
and issues an error message if any are incorrect. If you receive an error message, check that the value you entered is
correct, then reenter it. If needed, click <<back to reenter it.
Step 8 After successful validation of the Enterprise port values you entered, the wizard presents the 10-Gbps Cluster port and
presents it as NETWORK ADAPTER #2. As explained in Interface Cable Connections, this port is used to link the
appliance to the cluster, so apply the host IP address, netmask, and other values that are appropriate for this purpose
(see Required IP Addresses and Subnets and Required Configuration Information for the values to enter).
Enter the configuration values for NETWORK ADAPTER #2, as shown in the table below.
Table 27: Secondary Node Entries for Network Adapter #2: 10-Gbps Cluster Port
Host IPv4/IPv6 address field Enter the IP address for the Cluster port. This is required.
Note that you cannot change the address of the Cluster
port later.
IPv4 Netmask/IPv6 Prefix Length field Do one of the following if you entered an IP address:
• If you selected IPv4 addressing, enter the netmask
for the port's IP address. This is required.
• If you selected IPv6 addressing, enter the prefix length
(in bits). Valid values range from 10 through 127.
Default Gateway IPv4/IPv6 address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able to
complete the configuration wizard.
IPv4/IPv6 DNS Servers field Enter the IP address of the preferred DNS server. If you
are entering multiple DNS servers, separate the IP
addresses in the list with spaces.
Important For each appliance in your cluster, configure
a maximum of three DNS servers. Problems
can occur if you configure more than three
DNS servers for an appliance.
IPv4/IPv6 Static Routes field Enter one or more static routes in the following format,
separated by spaces: <network>/<netmask>/<gateway>.
This is usually required on the Management port only.
Vlan Id of Interface field Enter the VLAN ID that will be tagged over the LACP
link to be created for the appliance you are configuring.
Note This field is displayed only if you set Layer
2 LACP portchannel mode for the appliance
by choosing both options in Step 6.
Cluster Link field Check the check box to set this port as the link to a Cisco
DNA Center cluster. This is required on the Cluster port
only.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens. The wizard validates and applies your network adapter configurations.
Step 9 After successful validation of the Cluster port values you entered, the wizard presents the 1-Gbps/10-Gbps Management
port and presents it as NETWORK ADAPTER #3. As explained in Interface Cable Connections, this port is used to
access the Cisco DNA Center GUI from your management network. Apply the host IP address, netmask, and other
values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required Configuration
Information for the values to enter).
Enter the configuration values for NETWORK ADAPTER #3, as shown in the table below.
Table 28: Secondary Node Entries for Network Adapter #3: 1-Gbps/10-Gbps Management Port
Host IPv4/IPv6 address field Enter the IP address for the Management Port. This is
required only if you are using this port to access the Cisco
DNA Center GUI from your management network;
otherwise, you can leave it blank.
Default Gateway IPv4/IPv6 address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able to
complete the configuration wizard.
IPv4/IPv6 DNS Servers field Enter the IP address of the preferred DNS server. If you
are entering multiple DNS servers, separate the IP
addresses in the list with spaces.
Important • For NTP, ensure port 123 (UDP) is open
between Cisco DNA Center and your
NTP server.
• For each appliance in your cluster,
configure a maximum of three DNS
servers. Problems can occur if you
configure more than three DNS servers
for an appliance.
IPv4/IPv6 Static Routes field Enter one or more static routes in the following format,
separated by spaces: <network>/<netmask>/<gateway>.
Cluster Link field Leave this field blank. It is required on the Cluster port
only.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens. The wizard validates and applies your network adapter configurations.
Step 10 After successful validation of the Management port values you entered, the wizard presents the 1-Gbps/10-Gbps Internet
port as NETWORK ADAPTER #4. As explained in Interface Cable Connections, this is an optional port used to link
the appliance to the Internet when you cannot do so through the 10-Gbps Enterprise port. Apply the host IP address,
netmask, and other values that are appropriate for this purpose (see Required IP Addresses and Subnets and Required
Configuration Information for the values to enter).
Enter the configuration values for NETWORK ADAPTER #4, as shown in the table below.
Table 29: Secondary Node Entries for Network Adapter #4: 1-Gbps/10-Gbps Internet Port
Host IPv4/IPv6 address field Enter the IP address for the Internet port. This is required
only if you are using the Internet port for internet
connection; otherwise, you can leave it blank.
Default Gateway IPv4/IPv6 address field Enter a default gateway IP address to use for the Internet
port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able to
complete the configuration wizard.
IPv4/IPv6 DNS Servers field Enter the IP address of the preferred DNS server. If you
are entering multiple DNS servers, separate the IP
addresses in the list with spaces.
Important For each appliance in your cluster, configure
a maximum of three DNS servers. Problems
can occur if you configure more than three
DNS servers for an appliance.
IPv4/IPv6 Static Routes field Enter one or more static routes in the following format,
separated by spaces: <network>/<netmask>/<gateway>.
This is usually required on the Management port only.
Cluster Link field Leave this field blank. It is required on the Cluster port
only.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens. The wizard validates and applies your network adapter configurations.
Step 11 After the network adapter configuration is complete, the wizard prompts you to enter configuration values for the
NETWORK PROXY that you are using, as shown below.
Enter the configuration values for the NETWORK PROXY, as shown in the table below.
HTTPS Proxy field Enter the URL or host name of an HTTPS network proxy
used to access the Internet.
Note • Connection from Cisco DNA Center to the
HTTPS proxy is supported only through HTTP
in this release.
• If you enter an IPv6 URL that contains a port
number, enclose the IP address portion of the
URL in square brackets. In this example, 443 is
the port number:
http://[2001:db8:85a3:8d3:1319:8a2e:370:7348]:443/
HTTPS Proxy Username field Enter the user name used to access the network proxy. If
no proxy login is required, leave this field blank.
HTTPS Proxy Password field Enter the password used to access the network proxy. If
no proxy login is required, leave this field blank.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens.
Step 12 After network proxy configuration completes, the wizard prompts you to identify the Cluster port on the primary node
and primary node login details, in MAGLEV CLUSTER DETAILS (as shown below).
Enter the values for MAGLEV CLUSTER DETAILS, as shown in the table below.
Maglev Primary Node field Enter the IP address of the Cluster port on the primary
node in the cluster. If you have followed the
recommendations for port assignment, this will be the IP
address of Network Adapter #2 on the primary node.
Password field Enter the Linux password you configured on the primary
node.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens.
Step 13 After you have entered the cluster details, the wizard prompts you to enter USER ACCOUNT SETTINGS values, as
shown below.
Enter the values for USER ACCOUNT SETTINGS, as shown in the table below.
Linux Password field Enter a Linux password for the maglev user.
Re-enter Linux Password field Confirm the Linux password by entering it a second time.
Password Generation Seed field If you do not want to create the Linux password yourself,
enter a seed phrase in this field and then press <Generate
Password> to generate the password.
Auto Generated Password field (Optional) The seed phrase appears as part of a random
and secure password. If required, you can either use this
password as is, or you can further edit this auto-generated
password.
Click <Use Generated Password> to save the password.
Administrator Password field Enter a password for the default admin superuser, used to
log in to Cisco DNA Center for the first time.
Re-enter Administrator Password field Confirm the administrator password by entering it a second
time.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens.
Step 14 After you have entered the user account details, the wizard prompts you to enter NTP SERVER SETTINGS values.
Enter the values for NTP SERVER SETTINGS, as shown in the table below.
NTP Servers field Enter one or more NTP server addresses or hostnames,
separated by spaces. At least one NTP address or hostname
is required. For a production deployment, we recommend
that you configure a minimum of three NTP servers.
NTP Authentication check box To enable the authentication of your NTP server before
it's synchronized with Cisco DNA Center, check this check
box and then enter the following information:
• The NTP server's key ID. Valid values range between
1 and 4294967295 (2^32-1).
This value corresponds to the key ID that's defined
in the NTP server's key file.
• The SHA-1 key value associated with the NTP
server's key ID. This 40-character hex string resides
in the NTP server's key file.
After you provide the necessary information, click next>> to proceed. Correct validation errors, if any, as you did in
previous screens. The wizard validates and applies your NTP server configuration.
Step 15 When you are finished entering the NTP server settings, a final message appears, stating that the wizard is ready to
apply the configuration (as shown below).
What to do next
• If you have an additional appliance to deploy as the third and final node in the cluster, repeat this procedure.
• If you have finished adding hosts to the cluster, perform the first-time setup: First-Time Setup Workflow.
To proceed, first configure the primary node in your cluster. Then, if you have installed three appliances and
want to add the second and third nodes to your cluster, configure the secondary nodes.
Important These wizards are available for use if you are configuring a new appliance that came with Cisco DNA Center
2.3.3 already installed. If you upgraded from a previous version and want to use these wizards, contact Cisco
TAC for assistance.
If you want to specify your own IP address, subnet mask, and default gateway for your appliance's Enterprise
interface (and not use the values assigned by a DHCP server), ensure that you complete the Static IP Address
Settings screen.
The first generation 44-core Cisco DNA Center appliance (Cisco part number DN1-HW-APL) cannot be
configured using this wizard.
Important You can only use this wizard to complete the initial configuration of a new Cisco DNA Center appliance. To
reimage an appliance that's been configured previously, you will need to use the Maglev Configuration wizard
(see Configure the Appliance Using the Maglev Wizard, on page 81).
Important You cannot use this wizard to configure the second or third appliance in a three-node cluster. To do so,
complete the steps described in Configure a Secondary Node Using the Advanced Install Configuration
Wizard, on page 155. Also, you cannot use this wizard to enable LACP mode on your appliance's Enterprise
and Intracluster interfaces.
Note Ensure that all of the IP addresses you enter while completing this procedure are valid IPv4 addresses with
valid IPv4 netmasks. Also make sure that the addresses and their corresponding subnets do not overlap. Service
communication issues can result if they do.
Important Before you configure any of the appliances in a three-node cluster, ensure that you have logged out of those
appliances. Otherwise, the Quick Start workflow (which you complete to discover your network's devices
and enable telemetry) will not start after you have configured your cluster's appliances and log in to Cisco
DNA Center for the first time.
Important This is only applicable if you are going to configure a promotional appliance,
because the Cisco DNA Center software image is not preinstalled on the following
appliances:
• 44-core promotional appliance (Cisco part number DN2-HW-APL-U)
• 56-core promotional appliance: (Cisco part number DN2-HW-APL-L-U)
• Collected all of the information called for in Required IP Addresses and Subnets, on page 29 and Required
Configuration Information.
• Installed the appliance as described in Appliance Installation Workflow.
• Configured Cisco IMC browser access on this appliance, as described in Enable Browser Access to Cisco
Integrated Management Controller.
• Checked that the appliance's ports and the switches it uses are properly configured, as described in Execute
Preconfiguration Checks.
• Are using a browser that is compatible with Cisco IMC and Cisco DNA Center. For a list of compatible
browsers, see the Release Notes for the version of Cisco DNA Center you are installing.
• Enabled ICMP on the firewall between Cisco DNA Center and the DNS servers you will specify in the
following procedure. This wizard uses Ping to verify the DNS server you specify. This ping can be
blocked if there is a firewall between Cisco DNA Center and the DNS server and ICMP is not enabled
on that firewall. When this happens, you will not be able to complete the wizard.
b) From the blue link menu, choose Launch KVM and then select either Java based KVM or HTML based KVM.
If you select the Java-based KVM, you will need to launch the Java startup file from your browser or file manager
in order to view the KVM console in its own window. If you select the HMTL-based KVM, it will launch the KVM
console in a separate browser window or tab automatically.
Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and
respond to Maglev Configuration Wizard prompts.
c) With the KVM displayed, reboot the appliance by making one of the following selections:
• In the main Cisco IMC GUI browser window: Choose Host Power > Power Cycle. Then switch to the KVM
console to continue.
• In the KVM console: Choose Power > Power Cycle System (cold boot).
e) Click the Start a Cisco DNA Center Cluster radio button, then click Next.
The wizard will help you configure the Enterprise and Intracluster ports, which are required for Cisco DNA Center
functionality. If the wizard fails to display either or both of these ports in the next screen, they may be non-functional
or disabled. If you discover that they are non-functional, choose Exit to exit the wizard immediately. Be sure you
have completed all of the steps provided in Execute Preconfiguration Checks before resuming configuration or
contacting the Cisco Technical Assistance Center (TAC).
The configuration wizard sets up the Enterprise, Management, and Internet Access interfaces on the Enterprise port.
The wizard also prepopulates values for almost all of the listed parameters.
If your network resides behind a firewall, do the following:
• Click the allow access to these URLs link to view a popup window that lists the URLs that Cisco DNA Center
must be able to access.
• Click the open these ports link to view a popup window that lists the network service ports that must be available
for Cisco DNA Center to use.
b) In the DNS field, enter the IP address of the preferred DNS server. To enter additional DNS servers, click the Add
(+) icon.
Important You can configure a maximum of three DNS servers. Problems can occur if you configure more than
three DNS servers for an appliance.
c) Review the interface settings that have been set, then click Configure.
d) After initial interface configuration has completed, click Next to proceed to the next wizard screen.
The Configure Proxy Server Information screen opens.
Proxy Server field Enter the URL or host name of an HTTPS network proxy
used to access the Internet.
Note Connection from Cisco DNA Center to the
HTTPS proxy is supported only via HTTP
in this release.
Port field Enter the port your appliance used to access the network
proxy.
Username field Enter the user name used to access the network proxy. If
no proxy login is required, leave this field blank.
Password field Enter the password used to access the network proxy. If
no proxy login is required, leave this field blank.
The wizard validates the information you have entered and notifies you of any settings that need to be changed
before you can proceed with the wizard. If the settings you have entered are valid, the wizard's Advanced
Appliance Settings screen opens.
To access from Enterprise Network and For Intracluster Enter the virtual IP address that will be used for traffic
Access fields between the cluster and both the Enterprise and
Intracluster interfaces on your appliance. This is required
for single-node clusters that will be converted into a
three-node cluster in the future. If you have a single-node
cluster setup and don't plan to move to a three-node cluster
setup, you can leave the fields in this section blank.
Important If you choose to configure a virtual IP
address, you must enter one for each
configured network interface. You will not
be able to complete the wizard unless you
do so. These addresses are tied to the cluster
link's status, which must be in the UP state.
Fully Qualified Domain Name (FQDN) field Enter the fully qualified domain name (FQDN) for your
cluster. Cisco DNA Center does the following with this
hostname:
• It uses this hostname to access your cluster’s web
interface and the Representational State Transfer
(REST) APIs used by devices in the enterprise
network that Cisco DNA Center manages.
• In the Subject Alternative Name (SAN) field of
Cisco DNA Center certificates, it uses the FQDN to
the define the Plug and Play server that should be
used for device provisioning.
CLI Credentials
Password and Confirm Password fields Enter and then confirm the password for the maglev user.
NTP Server field Enter at least one NTP server address or hostname. To
enter additional NTP server addresses or hostnames, click
the Add (+) icon.
For a production deployment, Cisco recommends that
you configure a minimum of three NTP servers.
Subnet Settings
Container Subnet field A dedicated, non-routed IP subnet that Cisco DNA Center
uses to manage internal services. By default, this is
already set to 169.254.32.0/20, and you cannot enter
another subnet.
Cluster Subnet field A dedicated, non-routed IP subnet that Cisco DNA Center
uses to manage internal cluster services. By default, this
is already set to 169.254.48.0/20, and you cannot enter
another subnet.
Note To download the appliance configuration as a JSON file, click the here link.
g) Scroll to the bottom of the screen and review all of the settings that you have entered while completing the wizard.
If necessary, click the appropriate Edit link to open the wizard screen in which you want to make updates.
h) To complete the configuration of your Cisco DNA Center appliance, click Start Configuration.
The wizard screen continuously updates during the process, indicating the tasks that are currently being completed
and their progress, as well as any errors that have occurred. To save a local copy of this information as a text file,
click the Download link.
Step 3 After appliance configuration completes, click the copy icon in the Cisco DNA Center - Admin Credential area to copy
the default admin superuser password.
Important Cisco DNA Center automatically sets this password when you complete the Install configuration wizard.
Ensure that you click the copy icon before you proceed. Otherwise, you will not be able to log in to Cisco
DNA Center for the first time.
Note As a security measure, you'll be prompted to change this password after you log in. For more information,
see Complete the Quick Start Workflow, on page 233.
What to do next
As you are deploying this appliance in standalone mode, continue by performing first-time setup: First-Time
Setup Workflow.
Important The following second generation Cisco DNA Center appliances support configuration using this wizard:
• 44-core appliance: Cisco part number DN2-HW-APL
• 44-core promotional appliance: Cisco part number DN2-HW-APL-U
• 56-core appliance: Cisco part number DN2-HW-APL-L
• 56-core promotional appliance: Cisco part number DN2-HW-APL-L-U
The first generation 44-core Cisco DNA Center appliance (Cisco part number DN1-HW-APL) cannot be
configured using this wizard.
If you are configuring the installed appliance as a secondary node for an existing cluster that already has a
primary node, follow the steps in Configure a Secondary Node Using the Advanced Install Configuration
Wizard, on page 155 instead.
Important You can only use this wizard to complete the initial configuration of a new Cisco DNA Center appliance. To
reimage an appliance that's been configured previously, you will need to use the Maglev Configuration wizard
(see Configure the Appliance Using the Maglev Wizard, on page 81).
Note Ensure that all of the IP addresses you enter while completing this procedure are valid IPv4 addresses with
valid IPv4 netmasks. Also make sure that the addresses and their corresponding subnets do not overlap. Service
communication issues can result if they do.
Important Before you configure the appliances in a three-node cluster, ensure that you have logged out of those appliances.
Otherwise, the Quick Start workflow (which you complete to discover your network's devices and enable
telemetry) will not start after you have configured your cluster's appliances and log in to Cisco DNA Center
for the first time.
Important This is only applicable if you are going to configure a promotional appliance,
because the Cisco DNA Center software image is not preinstalled on the following
appliances:
• 44-core promotional appliance (Cisco part number DN2-HW-APL-U)
• 56-core promotional appliance: (Cisco part number DN2-HW-APL-L-U)
• Collected all of the information called for in Required IP Addresses and Subnets, on page 29 and Required
Configuration Information.
• Installed the first appliance as described in Appliance Installation Workflow.
• Configured Cisco IMC browser access on the primary node, as described in Enable Browser Access to
Cisco Integrated Management Controller.
• Checked that the primary node's ports and the switches it uses are properly configured, as described in
Execute Preconfiguration Checks.
• Are using a browser that is compatible with Cisco IMC and Cisco DNA Center. For a list of compatible
browsers, see the Release Notes for the version of Cisco DNA Center you are installing.
• Enabled ICMP on the firewall between Cisco DNA Center and both the default gateway and the DNS
server you specify in the following procedure. The wizard uses ping to verify the gateway and DNS
server you specify. This ping might get blocked if a firewall is in place and ICMP is not enabled on that
firewall. When this happens, you will not be able to complete the wizard.
b) From the blue link menu, choose Launch KVM and then select either Java based KVM or HTML based KVM.
If you select the Java-based KVM, you will need to launch the Java startup file from your browser or file manager
in order to view the KVM console in its own window. If you select the HMTL-based KVM, it will launch the KVM
console in a separate browser window or tab automatically.
Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and
respond to Maglev Configuration Wizard prompts.
c) With the KVM displayed, reboot the appliance by making one of the following selections:
• In the main Cisco IMC GUI browser window: Choose Host Power > Power Cycle. Then switch to the KVM
console to continue.
• In the KVM console: Choose Power > Power Cycle System (cold boot).
e) Click the Start a Cisco DNA Center Cluster radio button, then click Next.
Important At a minimum, you must configure the interfaces on your appliance's Enterprise and Cluster ports, as
they are required for Cisco DNA Center functionality. If the wizard fails to display either or both of these
ports during the course of configuration, they may be non-functional or disabled. If you discover that
they are non-functional, choose Exit to exit the wizard immediately. Be sure you have completed all of
the steps provided in Execute Preconfiguration Checks before resuming configuration or contacting the
Cisco Technical Assistance Center (TAC).
b) Click the No radio button (as you are configuring your cluster's primary node), then click Next.
The How would you like to set up your appliance interfaces? screen opens.
c) Indicate whether you want to configure dedicated Management and Internet Access interfaces, then click Next.
The Configure Your Enterprise Network Interface screen opens.
LACP Mode slider Choose one of the following network interface controller (NIC) bonding modes
for the Enterprise interface:
• Active-Backup mode: This mode provides fault tolerance by aggregating
two Ethernet interfaces into a single logical channel. When the interface
that's currently active goes down, the other interface takes its place and
becomes active.
• LACP mode: This mode aggregates two Ethernet interfaces that share the
same speed and duplex settings into a single logical channel. This provides
load balancing and higher bandwidth.
For more information about Cisco DNA Center's implementation of NIC bonding,
see NIC Bonding Overview, on page 67.
Host IP Address field Enter the IP address for the Enterprise port. This is required.
Subnet Mask field Enter the netmask for the port's IP address. This is required.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP address for at least one
of your appliance's interfaces. Otherwise, you will not be able to
complete the configuration wizard.
Note You designated this interface to use the default gateway assigned
to it by a DHCP server. Complete the following steps to specify a
different gateway:
1. Delete the IP address that is currently listed in this field and
then click Exit.
This will bring you back to the first wizard screen.
2. Return to the Enterprise port's wizard screen and enter the
gateway IP address you want to use.
DNS field Enter the IP address of the preferred DNS server. To enter additional DNS servers,
click the Add (+) icon.
Important For each node in your cluster, configure a maximum of three DNS
servers. Problems can occur if you configure more than three DNS
servers for an appliance.
Add/Edit Static Route link To configure a static route, click this link and then do the following:
1. Enter the route's network IP prefix, subnet mask, and nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
LACP Mode slider Choose one of the following NIC bonding modes for the Intracluster interface:
• Active-Backup mode: This mode provides fault tolerance by aggregating
two Ethernet interfaces into a single logical channel. When the interface
that's currently active goes down, the other interface takes its place and
becomes active.
• LACP mode: This mode aggregates two Ethernet interfaces that share the
same speed and duplex settings into a single logical channel. This provides
load balancing and higher bandwidth.
For more information about Cisco DNA Center's implementation of NIC bonding,
see NIC Bonding Overview, on page 67.
Host IP Address field Enter the IP address for the Cluster port. This is required. Note that you cannot
change the address of the Cluster port later.
Subnet Mask field Enter the netmask for the port's IP address. This is required.
Host IP Address field Enter the IP address for the Management port.
Subnet Mask field Enter the netmask for the port's IP address.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP address for at least one
of your appliance's interfaces. Otherwise, you will not be able to
complete the configuration wizard.
DNS field Enter the IP address of the preferred DNS server. To enter additional DNS servers,
click the Add (+) icon.
Important • For NTP, ensure port 123 (UDP) is open between Cisco DNA
Center and your NTP server.
• For each appliance in your cluster, configure a maximum of
three DNS servers. Problems can occur if you configure more
than three DNS servers for a node.
Add/Edit Static Route link To configure a static route, click this link and then do the following:
1. Enter the route's network IP prefix, subnet mask, and nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
Table 38: Primary Node Entries for the Internet Access Port
Host IP Address field Enter the IP address for the Internet Access port.
Subnet Mask field Enter the netmask for the port's IP address. This is required if you entered an IP
address in the previous field.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP address for at least one
of your appliance's interfaces. Otherwise, you will not be able to
complete the configuration wizard.
DNS field Enter the IP address of the preferred DNS server. To enter additional DNS servers,
click the Add (+) icon.
Important For each appliance in your cluster, configure a maximum of three
DNS servers. Problems can occur if you configure more than three
DNS servers for a node.
Add/Edit Static Route link To configure a static route, click this link and then do the following:
1. Enter the route's network IP prefix, subnet mask, and nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
h) Review the settings that you have entered for the primary node's interfaces.
If you need to make any changes, click the Edit link for the relevant interface.
i) When you are happy with the interface settings, click Configure.
j) After initial interface configuration has completed, click Next.
The wizard's Configure Proxy Server Information screen opens.
Proxy Server field Enter the URL or host name of an HTTPS network proxy used to access the
Internet.
Note Connection from Cisco DNA Center to the HTTPS proxy is
supported only via HTTP in this release.
Port field Enter the port your appliance used to access the network proxy.
Username field Enter the user name used to access the network proxy. If no proxy login is
required, leave this field blank.
Password field Enter the password used to access the network proxy. If no proxy login is required,
leave this field blank.
The wizard validates the information you have entered and notifies you of any settings that need to be changed
before you can proceed with the wizard. If the settings you have entered are valid and the port is up, the wizard's
Advanced Appliance Settings screen opens.
To access from Enterprise Network, To access from Enter the virtual IP address that will be used for traffic
Management Network, For Internet Access, and For between the cluster and the interfaces that you have
Intracluster Access fields configured on your primary node. This is required for
both three-node clusters and single-node clusters that will
Note If you configured the Management or
be converted into a three-node cluster in the future. If you
Internet Access interface on the same port
have a single-node cluster setup and don't plan to move
as the Enterprise interface, its corresponding
to a three-node cluster setup, you can leave the fields in
field is not displayed in this section.
this section blank.
Important If you choose to configure a virtual IP
address, you must enter one for each
configured network interface. You will not
be able to complete the wizard unless you
do so. These addresses are tied to the cluster
link's status, which must be in the UP state.
Fully Qualified Domain Name (FQDN) field Enter the fully qualified domain name (FQDN) for your
cluster. Cisco DNA Center does the following with this
hostname:
• It uses this hostname to access your cluster’s web
interface and the Representational State Transfer
(REST) APIs used by devices in the enterprise
network that Cisco DNA Center manages.
• In the Subject Alternative Name (SAN) field of
Cisco DNA Center certificates, it uses the FQDN to
the define the Plug and Play server that should be
used for device provisioning.
CLI Credentials
Password and Confirm Password fields Enter and then confirm the password for the maglev user.
Password and Confirm Password fields Enter and then confirm the password for the default admin
superuser, used to log in to Cisco DNA Center for the
first time.
Note As a security measure, you'll be prompted
to change this password after you log in. For
more information, see Complete the Quick
Start Workflow, on page 233.
NTP Server field Enter at least one NTP server address or hostname. To
enter additional NTP server addresses or hostnames, click
the Add (+) icon.
For a production deployment, Cisco recommends that
you configure a minimum of three NTP servers.
Turn On NTP Authentication check box To enable the authentication of your NTP server before
it's synchronized with Cisco DNA Center, check this
check box and then enter the following information:
• The NTP server's key ID. Valid values range between
1 and 4294967295 (2^32-1).
This value corresponds to the key ID that's defined
in the NTP server's key file.
• The SHA-1 key value associated with the NTP
server's key ID. This 40-character hex string resides
in the NTP server's key file.
Subnet Settings
Container Subnet field A dedicated, non-routed IP subnet that Cisco DNA Center
uses to manage internal services. By default, this is
already set to 169.254.32.0/20, and we recommend that
you use this subnet.
Cluster Subnet field A dedicated, non-routed IP subnet that Cisco DNA Center
uses to manage internal cluster services. By default, this
is already set to 169.254.48.0/20, and we recommend that
you use this subnet.
Note To download the appliance configuration as a JSON file, click the here link.
m) Review all of the settings that you have entered while completing the wizard. If necessary, click the appropriate Edit
link to open the wizard screen in which you want to make updates.
n) To complete the configuration of your Cisco DNA Center appliance, click Start Configuration.
The wizard screen continuously updates during the process, indicating the tasks that are currently being completed
and their progress, as well as any errors that have occurred. To save a local copy of this information as a text file,
click the download icon.
What to do next
When this task is complete:
• If you are deploying this appliance in standalone mode only, continue by performing first-time setup:
First-Time Setup Workflow.
• If you are deploying this appliance as the primary node in a cluster, configure the second and third
installed appliances in the cluster: Configure a Secondary Node Using the Advanced Install Configuration
Wizard, on page 155.
Important • In order to build a three-node cluster, the same version of the System package must be installed on your
three Cisco DNA Center appliances. Otherwise, unexpected behavior and possible downtime can occur.
• The following second generation Cisco DNA Center appliances support configuration using the Advanced
Install configuration wizard:
• 44-core appliance: Cisco part number DN2-HW-APL
• 44-core promotional appliance: Cisco part number DN2-HW-APL-U
• 56-core appliance: Cisco part number DN2-HW-APL-L
• 56-core promotional appliance: Cisco part number DN2-HW-APL-L-U
The first generation 44-core Cisco DNA Center appliance (Cisco part number DN1-HW-APL) cannot
be configured using this wizard.
Important You can only use this wizard to complete the initial configuration of a new Cisco DNA Center appliance. To
reimage an appliance that's been configured previously, you will need to use the Maglev Configuration wizard
(see Configure the Appliance Using the Maglev Wizard, on page 81).
Note Ensure that all of the IP addresses you enter while completing this procedure are valid IPv4 addresses with
valid IPv4 netmasks. Also make sure that the addresses and their corresponding subnets do not overlap. Service
communication issues can result if they do.
Important Before you configure the appliances in a three-node cluster, ensure that you have logged out of those appliances.
Otherwise, the Quick Start workflow (which you complete to discover your network's devices and enable
telemetry) will not start after you have configured your cluster's appliances and log in to Cisco DNA Center
for the first time.
When joining each new secondary nodes to the cluster, you must specify the first appliance in the cluster as
the primary node. Note the following when joining secondary nodes to a cluster:
• Before adding a new node to the cluster, be sure that all installed packages are deployed on the primary
node. You can check this by using Secure Shell to log in to the primary node's Cisco DNA Center
Management port as the Linux User (maglev) and then running the command maglev package status.
All installed packages should appear in the command output as DEPLOYED. In the following example, a
few packages were not installed, such as the application-policy and sd-access packages. They are the
only packages whose status is NOT_DEPLOYED. Your package status should look similar to this before
configuring a secondary node.
• Be sure to join only a single node to the cluster at a time. Do not attempt to add multiple nodes at the
same time, as doing so will result in unpredictable behavior.
• Expect some service downtime during the cluster attachment process for each secondary node. Services
will need to be redistributed across the nodes and the cluster will be down for periods of time during that
process.
Important This is only applicable if you are going to configure a promotional appliance,
because the Cisco DNA Center software image is not preinstalled on the following
appliances:
• 44-core promotional appliance (Cisco part number DN2-HW-APL-U)
• 56-core promotional appliance: (Cisco part number DN2-HW-APL-L-U)
• Configured the first appliance in the cluster, following the steps in Configure the Primary Node Using
the Advanced Install Configuration Wizard, on page 137.
• Collected all of the information called for in Required IP Addresses and Subnets, on page 29 and Required
Configuration Information.
• Installed the second and third appliances as described in Appliance Installation Workflow.
• Have done the following:
1. Ran the maglev package status command on the first appliance.
You can also access this information from the Cisco DNA Center GUI by clicking the Help icon
( ) and choosing About > Packages.
2. Contacted the Cisco TAC, gave them the output of this command, and asked them to point you to
the ISO that you should install on your second and third appliances.
• Configured Cisco IMC browser access on both secondary nodes as described in Enable Browser Access
to Cisco Integrated Management Controller.
• Checked that both secondary nodes' ports and the switches they use are properly configured, as described
in Execute Preconfiguration Checks.
• Are using a compatible browser. For a list of compatible browsers, see the Release Notes for the version
of Cisco DNA Center you are installing.
• Enabled ICMP on the firewall between Cisco DNA Center and both the default gateway and the DNS
server you specify in the following procedure. The wizard uses ping to verify the gateway and DNS
server you specify. This ping might get blocked if a firewall is in place and ICMP is not enabled on that
firewall. When this happens, you will not be able to complete the wizard.
b) From the blue link menu, choose Launch KVM and then select either Java based KVM or HTML based KVM.
If you select the Java-based KVM, you will need to launch the Java startup file from your browser or file manager
in order to view the KVM console in its own window. If you select the HMTL-based KVM, it will launch the KVM
console in a separate browser window or tab automatically.
Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and
respond to Maglev Configuration Wizard prompts.
c) With the KVM displayed, reboot the appliance by making one of the following selections:
• In the main Cisco IMC GUI browser window: Choose Host Power > Power Cycle. Then switch to the KVM
console to continue.
• In the KVM console: Choose Power > Power Cycle System (cold boot).
e) Click the Join a Cisco DNA Center Cluster radio button, then click Next.
Important At a minimum, you must configure the interfaces on your appliance's Enterprise and Cluster ports, as
they are required for Cisco DNA Center functionality. If the wizard fails to display either or both of these
ports during the course of configuration, they may be non-functional or disabled. If you discover that
they are non-functional, choose Exit to exit the wizard immediately. Be sure you have completed all of
the steps provided in Execute Preconfiguration Checks before resuming configuration or contacting the
Cisco Technical Assistance Center (TAC).
c) Indicate whether you want to configure dedicated Management and Internet Access interfaces, then click Next.
The Configure Your Enterprise Network Interface screen opens.
LACP Mode slider Choose one of the following network interface controller
(NIC) bonding modes for the Enterprise interface:
• Active-Backup mode: This mode provides fault
tolerance by aggregating two Ethernet interfaces into
a single logical channel. When the interface that's
currently active goes down, the other interface takes
its place and becomes active.
• LACP mode: This mode aggregates two Ethernet
interfaces that share the same speed and duplex
settings into a single logical channel. This provides
load balancing and higher bandwidth.
Host IP Address field Enter the IP address for the Enterprise port. This is
required.
Subnet Mask field Enter the netmask for the port's IP address. This is
required.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able
to complete the configuration wizard.
DNS field Enter the IP address of the preferred DNS server. To enter
additional DNS servers, click the Add (+) icon.
Important For each appliance in your cluster, configure
a maximum of three DNS servers. Problems
can occur if you configure more than three
DNS servers for a node.
Add/Edit Static Route link To configure a static route, click this link and then do the
following:
1. Enter the route's network IP prefix, subnet mask, and
nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
LACP Mode slider Choose one of the following NIC bonding modes for the
Intracluster interface:
• Active-Backup mode: This mode provides fault
tolerance by aggregating two Ethernet interfaces into
a single logical channel. When the interface that's
currently active goes down, the other interface takes
its place and becomes active.
• LACP mode: This mode aggregates two Ethernet
interfaces that share the same speed and duplex
settings into a single logical channel. This provides
load balancing and higher bandwidth.
Host IP Address field Enter the IP address for the Cluster port. This is required.
Note that you cannot change the address of the Cluster
port later.
Subnet Mask field Enter the netmask for the port's IP address. This is
required.
Host IP Address field Enter the IP address for the Management port.
Subnet Mask field Enter the netmask for the port's IP address.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able
to complete the configuration wizard.
DNS field Enter the IP address of the preferred DNS server. To enter
additional DNS servers, click the Add (+) icon.
Important • For NTP, ensure port 123 (UDP) is
open between Cisco DNA Center and
your NTP server.
• For each appliance in your cluster,
configure a maximum of three DNS
servers. Problems can occur if you
configure more than three DNS servers
for a node.
Add/Edit Static Route link To configure a static route, click this link and then do the
following:
1. Enter the route's network IP prefix, subnet mask, and
nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
Table 44: Secondary Node Entries for the Internet Access Port
Host IP Address field Enter the IP address for the Internet Access port.
Subnet Mask field Enter the netmask for the port's IP address. This is
required if you entered an IP address in the previous field.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able
to complete the configuration wizard.
DNS field Enter the IP address of the preferred DNS server. To enter
additional DNS servers, click the Add (+) icon.
Important For each appliance in your cluster, configure
a maximum of three DNS servers. Problems
can occur if you configure more than three
DNS servers for a node.
Add/Edit Static Route link To configure a static route, click this link and then do the
following:
1. Enter the route's network IP prefix, subnet mask, and
nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
h) Review the settings that you have entered for the secondary node's interfaces.
If you need to make any changes, click the Edit link for the relevant interface to return to its wizard screen.
i) When you are happy with the interface settings, click Configure.
j) After initial interface configuration has completed, click Next.
The Configure Proxy Server Information screen opens.
Proxy Server field Enter the URL or host name of an HTTPS network proxy
used to access the Internet.
Note Connection from Cisco DNA Center to the
HTTPS proxy is supported only via HTTP
in this release.
Port field Enter the port your appliance used to access the network
proxy.
Username field Enter the user name used to access the network proxy. If
no proxy login is required, leave this field blank.
Password field Enter the password used to access the network proxy. If
no proxy login is required, leave this field blank.
The wizard validates the information you have entered and notifies you of any settings that need to be changed
before you can proceed with the wizard. If the settings you have entered are valid, the wizard's Primary Node
Details screen opens.
l) To establish a connection with your cluster's primary node, enter its IP address and login credentials, and then click
Next.
The Advanced Appliance Settings screen opens.
CLI Credentials
Password and Confirm Password fields Enter and then confirm the password for the maglev user.
NTP Server field Enter at least one NTP server address or hostname. To
enter additional NTP server addresses or hostnames, click
the Add (+) icon.
For a production deployment, Cisco recommends that
you configure a minimum of three NTP servers.
Turn On NTP Authentication check box To enable the authentication of your NTP server before
it's synchronized with Cisco DNA Center, check this
check box and then enter the following information:
• The NTP server's key ID. Valid values range between
1 and 4294967295 (2^32-1).
This value corresponds to the key ID that's defined
in the NTP server's key file.
• The SHA-1 key value associated with the NTP
server's key ID. This 40-character hex string resides
in the NTP server's key file.
Note To download the appliance configuration as a JSON file, click the here link.
n) Review all of the settings that you have entered while completing the wizard. If necessary, click the appropriate Edit
link to open the wizard screen in which you want to make updates.
o) To complete the configuration of your Cisco DNA Center appliance, click Start Configuration.
The wizard screen continuously updates during the process, indicating the tasks that are currently being completed
and their progress, as well as any errors that have occurred. To save a local copy of this information as a text file,
click the download icon.
What to do next
When this task is complete:
• If you have an additional appliance to deploy as the third and final node in the cluster, repeat this procedure.
• If you are finished adding nodes to the cluster, continue by performing first-time setup: First-Time Setup
Workflow.
To proceed, first configure the primary node in your cluster. Then, if you have installed three appliances and
want to add the second and third nodes to your cluster, configure the secondary nodes.
Important These wizards are available for use if you are configuring a new appliance that came with Cisco DNA Center
2.3.3 already installed. If you upgraded from a previous version and want to use these wizards, contact Cisco
TAC for assistance.
If you want to specify your own IP address, subnet mask, and default gateway for your appliance's Enterprise
interface (and not use the values assigned by a DHCP server), ensure that you complete the Static IP Address
Settings screen.
Important You can only use this wizard to complete the initial configuration of a new Cisco DNA Center appliance. To
reimage an appliance that's been configured previously, you will need to use the Maglev Configuration wizard
(see Configure the Appliance Using the Maglev Wizard, on page 81).
Important You cannot use this wizard to configure the second or third appliance in a three-node cluster. To do so,
complete the steps described in Configure a Secondary Node Using the Advanced Install Configuration
Wizard, on page 210. Also, you cannot use this wizard to enable LACP mode on your appliance's Enterprise
and Intracluster interfaces.
Note Ensure that all of the IP addresses you enter while completing this procedure are valid IPv4 addresses with
valid IPv4 netmasks. Also make sure that the addresses and their corresponding subnets do not overlap. Service
communication issues can result if they do.
Important Before you configure any of the appliances in a three-node cluster, ensure that you have logged out of those
appliances. Otherwise, the Quick Start workflow (which you complete to discover your network's devices
and enable telemetry) will not start after you have configured your cluster's appliances and log in to Cisco
DNA Center for the first time.
Important This is only applicable if you are going to configure a promotional appliance,
because the Cisco DNA Center software image is not preinstalled on the 112-core
promotional appliance (Cisco part number DN2-HW-APL-XL-U).
• Collected all of the information called for in Required IP Addresses and Subnets, on page 29 and Required
Configuration Information.
• Installed the appliance as described in Appliance Installation Workflow.
• Configured Cisco IMC browser access on this appliance, as described in Enable Browser Access to Cisco
Integrated Management Controller.
• Checked that the appliance's ports and the switches it uses are properly configured, as described in Execute
Preconfiguration Checks.
• Are using a browser that is compatible with Cisco IMC and Cisco DNA Center. For a list of compatible
browsers, see the Release Notes for the version of Cisco DNA Center you are installing.
• Enabled ICMP on the firewall between Cisco DNA Center and the DNS servers you will specify in the
following procedure. This wizard uses Ping to verify the DNS server you specify. This ping can be
blocked if there is a firewall between Cisco DNA Center and the DNS server and ICMP is not enabled
on that firewall. When this happens, you will not be able to complete the wizard.
b) From the blue link menu, choose Launch KVM and then select either Java based KVM or HTML based KVM.
If you select the Java-based KVM, you will need to launch the Java startup file from your browser or file manager
in order to view the KVM console in its own window. If you select the HMTL-based KVM, it will launch the KVM
console in a separate browser window or tab automatically.
Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and
respond to Maglev Configuration Wizard prompts.
c) With the KVM displayed, reboot the appliance by making one of the following selections:
• In the main Cisco IMC GUI browser window: Choose Host Power > Power Cycle. Then switch to the KVM
console to continue.
• In the KVM console: Choose Power > Power Cycle System (cold boot).
e) Click the Start a Cisco DNA Center Cluster radio button, then click Next.
The wizard will help you configure the Enterprise and Cluster ports, which are required for Cisco DNA Center
functionality. If the wizard fails to display either or both of these ports in the next screen, they may be non-functional
or disabled. If you discover that they are non-functional, choose Exit to exit the wizard immediately. Be sure you
have completed all of the steps provided in Execute Preconfiguration Checks before resuming configuration or
contacting the Cisco Technical Assistance Center (TAC).
The configuration wizard sets up the Enterprise, Management, and Internet Access interfaces on the Enterprise port.
The wizard also prepopulates values for almost all of the listed parameters.
If your network resides behind a firewall, do the following:
• Click the allow access to these URLs link to view a popup window that lists the URLs that Cisco DNA Center
must be able to access.
• Click the open these ports link to view a popup window that lists the network service ports that must be available
for Cisco DNA Center to use.
b) In the DNS field, enter the IP address of the preferred DNS server. To enter additional DNS servers, click the Add
(+) icon.
Important You can configure a maximum of three DNS servers. Problems can occur if you configure more than
three DNS servers for an appliance.
c) Review the interface settings that have been set, then click Configure.
d) After initial interface configuration has completed, click Next to proceed to the next wizard screen.
The Configure Proxy Server Information screen opens.
Proxy Server field Enter the URL or host name of an HTTPS network proxy
used to access the Internet.
Note Connection from Cisco DNA Center to the
HTTPS proxy is supported only via HTTP
in this release.
Port field Enter the port your appliance used to access the network
proxy.
Username field Enter the user name used to access the network proxy. If
no proxy login is required, leave this field blank.
Password field Enter the password used to access the network proxy. If
no proxy login is required, leave this field blank.
The wizard validates the information you have entered and notifies you of any settings that need to be changed
before you can proceed with the wizard. If the settings you have entered are valid, the wizard's Advanced
Appliance Settings screen opens.
To access from Enterprise Network and For Intracluster Enter the virtual IP address that will be used for traffic
Access fields between the cluster and both the Enterprise and
Intracluster interfaces on your appliance. This is required
for single-node clusters that will be converted into a
three-node cluster in the future. If you have a single-node
cluster setup and don't plan to move to a three-node cluster
setup, you can leave the fields in this section blank.
Important If you choose to configure a virtual IP
address, you must enter one for each
configured network interface. You will not
be able to complete the wizard unless you
do so. These addresses are tied to the cluster
link's status, which must be in the UP state.
Fully Qualified Domain Name (FQDN) field Enter the fully qualified domain name (FQDN) for your
cluster. Cisco DNA Center does the following with this
hostname:
• It uses this hostname to access your cluster’s web
interface and the Representational State Transfer
(REST) APIs used by devices in the enterprise
network that Cisco DNA Center manages.
• In the Subject Alternative Name (SAN) field of
Cisco DNA Center certificates, it uses the FQDN to
the define the Plug and Play server that should be
used for device provisioning.
CLI Credentials
Password and Confirm Password fields Enter and then confirm the password for the maglev user.
NTP Server field Enter at least one NTP server address or hostname. To
enter additional NTP server addresses or hostnames, click
the Add (+) icon.
For a production deployment, Cisco recommends that
you configure a minimum of three NTP servers.
Subnet Settings
Container Subnet field A dedicated, non-routed IP subnet that Cisco DNA Center
uses to manage internal services. By default, this is
already set to 169.254.32.0/20, and you cannot enter
another subnet.
Cluster Subnet field A dedicated, non-routed IP subnet that Cisco DNA Center
uses to manage internal cluster services. By default, this
is already set to 169.254.48.0/20, and you cannot enter
another subnet.
Note To download the appliance configuration as a JSON file, click the here link.
g) Scroll to the bottom of the screen and review all of the settings that you have entered while completing the wizard.
If necessary, click the appropriate Edit link to open the wizard screen in which you want to make updates.
h) To complete the configuration of your Cisco DNA Center appliance, click Start Configuration.
The wizard screen continuously updates during the process, indicating the tasks that are currently being completed
and their progress, as well as any errors that have occurred. To save a local copy of this information as a text file,
click the Download link.
Step 3 After appliance configuration completes, click the copy icon in the Cisco DNA Center - Admin Credential area to copy
the default admin superuser password.
Important Cisco DNA Center automatically sets this password when you complete the Install configuration wizard.
Ensure that you click the copy icon before you proceed. Otherwise, you will not be able to log in to Cisco
DNA Center for the first time.
Note As a security measure, you'll be prompted to change this password after you log in. For more information,
see Complete the Quick Start Workflow, on page 233.
What to do next
As you are deploying this appliance in standalone mode, continue by performing first-time setup: First-Time
Setup Workflow.
Important The following second generation Cisco DNA Center appliances support configuration using this wizard:
• 112-core appliance: Cisco part number DN2-HW-APL-XL
• 112-core promotional appliance: Cisco part number DN2-HW-APL-XL-U
If you are configuring the installed appliance as a secondary node for an existing cluster that already has a
primary node, follow the steps in Configure a Secondary Node Using the Advanced Install Configuration
Wizard, on page 210 instead.
Important You can only use this wizard to complete the initial configuration of a new Cisco DNA Center appliance. To
reimage an appliance that's been configured previously, you will need to use the Maglev Configuration wizard
(see Configure the Appliance Using the Maglev Wizard, on page 81).
Note Ensure that all of the IP addresses you enter while completing this procedure are valid IPv4 addresses with
valid IPv4 netmasks. Also make sure that the addresses and their corresponding subnets do not overlap. Service
communication issues can result if they do.
Important Before you configure the appliances in a three-node cluster, ensure that you have logged out of those appliances.
Otherwise, the Quick Start workflow (which you complete to discover your network's devices and enable
telemetry) will not start after you have configured your cluster's appliances and log in to Cisco DNA Center
for the first time.
Important This is only applicable if you are going to configure a promotional appliance,
because the Cisco DNA Center software image is not preinstalled on the 112-core
promotional appliance (Cisco part number DN2-HW-APL-XL-U).
• Collected all of the information called for in Required IP Addresses and Subnets, on page 29 and Required
Configuration Information.
• Installed the first appliance as described in Appliance Installation Workflow.
• Configured Cisco IMC browser access on the primary node, as described in Enable Browser Access to
Cisco Integrated Management Controller.
• Checked that the primary node's ports and the switches it uses are properly configured, as described in
Execute Preconfiguration Checks.
• Are using a browser that is compatible with Cisco IMC and Cisco DNA Center. For a list of compatible
browsers, see the Release Notes for the version of Cisco DNA Center you are installing.
• Enabled ICMP on the firewall between Cisco DNA Center and both the default gateway and the DNS
server you specify in the following procedure. The wizard uses ping to verify the gateway and DNS
server you specify. This ping might get blocked if a firewall is in place and ICMP is not enabled on that
firewall. When this happens, you will not be able to complete the wizard.
b) From the blue link menu, choose Launch KVM and then select either Java based KVM or HTML based KVM.
If you select the Java-based KVM, you will need to launch the Java startup file from your browser or file manager
in order to view the KVM console in its own window. If you select the HMTL-based KVM, it will launch the KVM
console in a separate browser window or tab automatically.
Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and
respond to Maglev Configuration Wizard prompts.
c) With the KVM displayed, reboot the appliance by making one of the following selections:
• In the main Cisco IMC GUI browser window: Choose Host Power > Power Cycle. Then switch to the KVM
console to continue.
• In the KVM console: Choose Power > Power Cycle System (cold boot).
e) Click the Start a Cisco DNA Center Cluster radio button, then click Next.
Important At a minimum, you must configure the Enterprise and Intracluster ports, as they are required for Cisco
DNA Center functionality. If the wizard fails to display either or both of these ports during the course
of configuration, they may be non-functional or disabled. If you discover that they are non-functional,
choose Exit to exit the wizard immediately. Be sure you have completed all of the steps provided in
Execute Preconfiguration Checks before resuming configuration or contacting the Cisco Technical
Assistance Center (TAC).
b) Click the No radio button (as you are configuring your cluster's primary node), then click Next.
The How would you like to set up your appliance interfaces? screen opens.
c) Indicate whether you want to configure dedicated Management and Internet Access interfaces, then click Next.
The Configure Your Enterprise Network Interface screen opens.
LACP Mode slider Choose one of the following network interface controller
(NIC) bonding modes for the Enterprise interface:
• Active-Backup mode: This mode provides fault
tolerance by aggregating two Ethernet interfaces into
a single logical channel. When the interface that's
currently active goes down, the other interface takes
its place and becomes active.
• LACP mode: This mode aggregates two Ethernet
interfaces that share the same speed and duplex
settings into a single logical channel. This provides
load balancing and higher bandwidth.
Host IP Address field Enter the IP address for the Enterprise port. This is
required.
Subnet Mask field Enter the netmask for the port's IP address. This is
required.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able
to complete the configuration wizard.
DNS field Enter the IP address of the preferred DNS server. To enter
additional DNS servers, click the Add (+) icon.
Important For each appliance in your cluster, configure
a maximum of three DNS servers. Problems
can occur if you configure more than three
DNS servers for a node.
Add/Edit Static Route link To configure a static route, click this link and then do the
following:
1. Enter the route's network IP prefix, subnet mask, and
nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
The wizard validates the information you have entered, confirms that the port is up, and notifies you of any
settings that need to be changed before you can proceed with the wizard. If the settings you have entered are
valid and the port is up, the wizard's Configure Your Intracluster Interface screen opens.
LACP Mode slider Choose one of the following NIC bonding modes for the
Intracluster interface:
• Active-Backup mode: This mode provides fault
tolerance by aggregating two Ethernet interfaces into
a single logical channel. When the interface that's
currently active goes down, the other interface takes
its place and becomes active.
• LACP mode: This mode aggregates two Ethernet
interfaces that share the same speed and duplex
settings into a single logical channel. This provides
load balancing and higher bandwidth.
Host IP Address field Enter the IP address for the Cluster port. This is required.
Note that you cannot change the address of the Cluster
port later.
Subnet Mask field Enter the netmask for the port's IP address. This is
required.
Host IP Address field Enter the IP address for the Management port.
Subnet Mask field Enter the netmask for the port's IP address.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able
to complete the configuration wizard.
DNS field Enter the IP address of the preferred DNS server. To enter
additional DNS servers, click the Add (+) icon.
Important • For NTP, ensure port 123 (UDP) is
open between Cisco DNA Center and
your NTP server.
• For each appliance in your cluster,
configure a maximum of three DNS
servers. Problems can occur if you
configure more than three DNS servers
for a node.
Add/Edit Static Route link To configure a static route, click this link and then do the
following:
1. Enter the route's network IP prefix, subnet mask, and
nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
Table 52: Primary Node Entries for the Internet Access Port
Host IP Address field Enter the IP address for the Internet Access port.
Subnet Mask field Enter the netmask for the port's IP address. This is
required if you entered an IP address in the previous field.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able
to complete the configuration wizard.
DNS field Enter the IP address of the preferred DNS server. To enter
additional DNS servers, click the Add (+) icon.
Important For each appliance in your cluster, configure
a maximum of three DNS servers. Problems
can occur if you configure more than three
DNS servers for a node.
Add/Edit Static Route link To configure a static route, click this link and then do the
following:
1. Enter the route's network IP prefix, subnet mask, and
nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
h) Review the settings that you have entered for the primary node's interfaces.
If you need to make any changes, click the Edit link for the relevant interface.
i) When you are happy with the interface settings, click Configure.
j) After initial interface configuration has completed, click Next to proceed to the next wizard screen.
The wizard's Configure Proxy Server Information screen opens.
Proxy Server field Enter the URL or host name of an HTTPS network proxy
used to access the Internet.
Note Connection from Cisco DNA Center to the
HTTPS proxy is supported only via HTTP
in this release.
Port field Enter the port your appliance used to access the network
proxy.
Username field Enter the user name used to access the network proxy. If
no proxy login is required, leave this field blank.
Password field Enter the password used to access the network proxy. If
no proxy login is required, leave this field blank.
The wizard validates the information you have entered and notifies you of any settings that need to be changed
before you can proceed with the wizard. If the settings you have entered are valid and the port is up, the wizard's
Advanced Appliance Settings screen opens.
To access from Enterprise Network, To access from Enter the virtual IP address that will be used for traffic
Management Network, For Internet Access, and For between the cluster and the interfaces that you have
Intracluster Access fields configured on your primary node. This is required for
both three-node clusters and single-node clusters that will
Note If you configured the Management or
be converted into a three-node cluster in the future. If you
Internet Access interface on the same port
have a single-node cluster setup and don't plan to move
as the Enterprise interface, its corresponding
to a three-node cluster setup, you can leave the fields in
field is not displayed in this section.
this section blank.
Important If you choose to configure a virtual IP
address, you must enter one for each
configured network interface. You will not
be able to complete the wizard unless you
do so. These addresses are tied to the cluster
link's status, which must be in the UP state.
Fully Qualified Domain Name (FQDN) field Enter the fully qualified domain name (FQDN) for your
cluster. Cisco DNA Center does the following with this
hostname:
• It uses this hostname to access your cluster’s web
interface and the Representational State Transfer
(REST) APIs used by devices in the enterprise
network that Cisco DNA Center manages.
• In the Subject Alternative Name (SAN) field of
Cisco DNA Center certificates, it uses the FQDN to
the define the Plug and Play server that should be
used for device provisioning.
CLI Credentials
Password and Confirm Password fields Enter and then confirm the password for the maglev user.
Password and Confirm Password fields Enter and then confirm the password for the default admin
superuser, used to log in to Cisco DNA Center for the
first time.
Note As a security measure, you'll be prompted
to change this password after you log in. For
more information, see Complete the Quick
Start Workflow, on page 233.
NTP Server field Enter at least one NTP server address or hostname. To
enter additional NTP server addresses or hostnames, click
the Add (+) icon.
For a production deployment, Cisco recommends that
you configure a minimum of three NTP servers.
Turn On NTP Authentication check box To enable the authentication of your NTP server before
it's synchronized with Cisco DNA Center, check this
check box and then enter the following information:
• The NTP server's key ID. Valid values range between
1 and 4294967295 (2^32-1).
This value corresponds to the key ID that's defined
in the NTP server's key file.
• The SHA-1 key value associated with the NTP
server's key ID. This 40-character hex string resides
in the NTP server's key file.
Subnet Settings
Container Subnet field A dedicated, non-routed IP subnet that Cisco DNA Center
uses to manage internal services. By default, this is
already set to 169.254.32.0/20, and we recommend that
you use this subnet.
Cluster Subnet field A dedicated, non-routed IP subnet that Cisco DNA Center
uses to manage internal cluster services. By default, this
is already set to 169.254.48.0/20, and we recommend that
you use this subnet.
Note To download the appliance configuration as a JSON file, click the here link.
m) Review all of the settings that you have entered while completing the wizard. If necessary, click the appropriate Edit
link to open the wizard screen in which you want to make updates.
n) To complete the configuration of your Cisco DNA Center appliance, click Start Configuration.
The configuration process takes roughly 90 minutes. The wizard screen continuously updates during the process,
indicating the tasks that are currently being completed and their progress, as well as any errors that have occurred.
To save a local copy of this information as a text file, click the download icon.
What to do next
When this task is complete:
• If you are deploying this appliance in standalone mode only, continue by performing first-time setup:
First-Time Setup Workflow.
• If you are deploying this appliance as the primary node in a cluster, configure the second and third
installed appliances in the cluster: Configure a Secondary Node Using the Advanced Install Configuration
Wizard, on page 210.
Important • In order to build a three-node cluster, the same version of the System package must be installed on your
three Cisco DNA Center appliances. Otherwise, unexpected behavior and possible downtime can occur.
• The following second generation Cisco DNA Center appliances support configuration using this wizard:
• 112-core appliance: Cisco part number DN2-HW-APL-XL
• 112-core promotional appliance: Cisco part number DN2-HW-APL-XL-U
Important You can only use this wizard to complete the initial configuration of a new Cisco DNA Center appliance. To
reimage an appliance that's been configured previously, you will need to use the Maglev Configuration wizard
(see Configure the Appliance Using the Maglev Wizard, on page 81).
Note Ensure that all of the IP addresses you enter while completing this procedure are valid IPv4 addresses with
valid IPv4 netmasks. Also make sure that the addresses and their corresponding subnets do not overlap. Service
communication issues can result if they do.
Important Before you configure the appliances in a three-node cluster, ensure that you have logged out of those appliances.
Otherwise, the Quick Start workflow (which you complete to discover your network's devices and enable
telemetry) will not start after you have configured your cluster's appliances and log in to Cisco DNA Center
for the first time.
When joining each new secondary node to the cluster, you must specify the first host in the cluster as the
primary node. Note the following when joining secondary nodes to a cluster:
• Before adding a new node to the cluster, be sure that all installed packages are deployed on the primary
node. You can check this by using Secure Shell to log in to the primary node's Cisco DNA Center
Management port as the Linux User (maglev) and then running the command maglev package status.
All installed packages should appear in the command output as DEPLOYED. In the following example, a
few packages were not installed, such as the application-policy and sd-access packages. They are the
only packages whose status is NOT_DEPLOYED. Your package status should look similar to this before
configuring a secondary node.
• Be sure to join only a single node to the cluster at a time. Do not attempt to add multiple nodes at the
same time, as doing so will result in unpredictable behavior.
• Expect some service downtime during the cluster attachment process for each secondary node. Services
will need to be redistributed across the nodes and the cluster will be down for periods of time during that
process.
Important This is only applicable if you are going to configure a promotional appliance,
because the Cisco DNA Center software image is not preinstalled on the 112-core
promotional appliance (Cisco part number DN2-HW-APL-XL-U).
• Configured the first appliance in the cluster, following the steps in Configure the Primary Node Using
the Advanced Install Configuration Wizard, on page 191.
• Collected all of the information called for in Required IP Addresses and Subnets, on page 29 and Required
Configuration Information.
• Installed the second and third appliances as described in Appliance Installation Workflow.
• Have done the following:
• Configured Cisco IMC browser access on both secondary nodes as described in Enable Browser Access
to Cisco Integrated Management Controller.
• Checked that both secondary nodes' ports and the switches they use are properly configured, as described
in Execute Preconfiguration Checks.
• Are using a compatible browser. For a list of compatible browsers, see the Release Notes for the version
of Cisco DNA Center you are installing.
• Enabled ICMP on the firewall between Cisco DNA Center and both the default gateway and the DNS
server you specify in the following procedure. The wizard uses ping to verify the gateway and DNS
server you specify. This ping might get blocked if a firewall is in place and ICMP is not enabled on that
firewall. When this happens, you will not be able to complete the wizard.
b) From the blue link menu, choose Launch KVM and then select either Java based KVM or HTML based KVM.
If you select the Java-based KVM, you will need to launch the Java startup file from your browser or file manager
in order to view the KVM console in its own window. If you select the HMTL-based KVM, it will launch the KVM
console in a separate browser window or tab automatically.
Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and
respond to Maglev Configuration Wizard prompts.
c) With the KVM displayed, reboot the appliance by making one of the following selections:
• In the main Cisco IMC GUI browser window: Choose Host Power > Power Cycle. Then switch to the KVM
console to continue.
• In the KVM console: Choose Power > Power Cycle System (cold boot).
e) Click the Join a Cisco DNA Center Cluster radio button, then click Next.
Important At a minimum, you must configure the interfaces on your appliance's Enterprise and Cluster ports, as
they are required for Cisco DNA Center functionality. If the wizard fails to display either or both of these
ports during the course of configuration, they may be non-functional or disabled. If you discover that
they are non-functional, choose Exit to exit the wizard immediately. Be sure you have completed all of
the steps provided in Execute Preconfiguration Checks before resuming configuration or contacting the
Cisco Technical Assistance Center (TAC).
c) Indicate whether you want to configure dedicated Management and Internet Access interfaces, then click Next.
The Configure Your Enterprise Network Interface screen opens.
LACP Mode slider Choose one of the following network interface controller
(NIC) bonding modes for the Enterprise interface:
• Active-Backup mode: This mode provides fault
tolerance by aggregating two Ethernet interfaces into
a single logical channel. When the interface that's
currently active goes down, the other interface takes
its place and becomes active.
• LACP mode: This mode aggregates two Ethernet
interfaces that share the same speed and duplex
settings into a single logical channel. This provides
load balancing and higher bandwidth.
Host IP Address field Enter the IP address for the Enterprise port. This is
required.
Subnet Mask field Enter the netmask for the port's IP address. This is
required.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able
to complete the configuration wizard.
DNS field Enter the IP address of the preferred DNS server. To enter
additional DNS servers, click the Add (+) icon.
Important For each appliance in your cluster, configure
a maximum of three DNS servers. Problems
can occur if you configure more than three
DNS servers for a node.
Add/Edit Static Route link To configure a static route, click this link and then do the
following:
1. Enter the route's network IP prefix, subnet mask, and
nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
LACP Mode slider Choose one of the following NIC bonding modes for the
Intracluster interface:
• Active-Backup mode: This mode provides fault
tolerance by aggregating two Ethernet interfaces into
a single logical channel. When the interface that's
currently active goes down, the other interface takes
its place and becomes active.
• LACP mode: This mode aggregates two Ethernet
interfaces that share the same speed and duplex
settings into a single logical channel. This provides
load balancing and higher bandwidth.
Host IP Address field Enter the IP address for the Cluster port. This is required.
Note that you cannot change the address of the Cluster
port later.
Subnet Mask field Enter the netmask for the port's IP address. This is
required.
Host IP Address field Enter the IP address for the Management port.
Subnet Mask field Enter the netmask for the port's IP address.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able
to complete the configuration wizard.
DNS field Enter the IP address of the preferred DNS server. To enter
additional DNS servers, click the Add (+) icon.
Important • For NTP, ensure port 123 (UDP) is
open between Cisco DNA Center and
your NTP server.
• For each appliance in your cluster,
configure a maximum of three DNS
servers. Problems can occur if you
configure more than three DNS servers
for a node.
Add/Edit Static Route link To configure a static route, click this link and then do the
following:
1. Enter the route's network IP prefix, subnet mask, and
nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
Table 58: Secondary Node Entries for the Internet Access Port
Host IP Address field Enter the IP address for the Internet Access port.
Subnet Mask field Enter the netmask for the port's IP address. This is
required if you entered an IP address in the previous field.
Default Gateway IP Address field Enter a default gateway IP address to use for the port.
Important Ensure that you enter a default gateway IP
address for at least one of your appliance's
interfaces. Otherwise, you will not be able
to complete the configuration wizard.
DNS field Enter the IP address of the preferred DNS server. To enter
additional DNS servers, click the Add (+) icon.
Important For each appliance in your cluster, configure
a maximum of three DNS servers. Problems
can occur if you configure more than three
DNS servers for a node.
Add/Edit Static Route link To configure a static route, click this link and then do the
following:
1. Enter the route's network IP prefix, subnet mask, and
nexthop IP address.
To configure additional static routes, click +.
2. Click Add.
h) Review the settings that you have entered for the secondary node's interfaces.
If you need to make any changes, click the Edit link for the relevant interface to return to its wizard screen.
i) When you are happy with the interface settings, click Configure.
j) After initial interface configuration has completed, click Next to proceed to the next wizard screen.
The Configure Proxy Server Information screen opens.
Proxy Server field Enter the URL or host name of an HTTPS network proxy
used to access the Internet.
Note Connection from Cisco DNA Center to the
HTTPS proxy is supported only via HTTP
in this release.
Port field Enter the port your appliance used to access the network
proxy.
Username field Enter the user name used to access the network proxy. If
no proxy login is required, leave this field blank.
Password field Enter the password used to access the network proxy. If
no proxy login is required, leave this field blank.
The wizard validates the information you have entered and notifies you of any settings that need to be changed
before you can proceed with the wizard. If the settings you have entered are valid, the wizard's Primary Node
Details screen opens.
l) To establish a connection with your cluster's primary node, enter its IP address and login credentials, and then click
Next.
The Advanced Appliance Settings screen opens.
CLI Credentials
Password and Confirm Password fields Enter and then confirm the password for the maglev user.
NTP Server field Enter at least one NTP server address or hostname. To
enter additional NTP server addresses or hostnames, click
the Add (+) icon.
For a production deployment, Cisco recommends that
you configure a minimum of three NTP servers.
Turn On NTP Authentication check box To enable the authentication of your NTP server before
it's synchronized with Cisco DNA Center, check this
check box and then enter the following information:
• The NTP server's key ID. Valid values range between
1 and 4294967295 (2^32-1).
This value corresponds to the key ID that's defined
in the NTP server's key file.
• The SHA-1 key value associated with the NTP
server's key ID. This 40-character hex string resides
in the NTP server's key file.
Note To download the appliance configuration as a JSON file, click the here link.
n) Review all of the settings that you have entered while completing the wizard. If necessary, click the appropriate Edit
link to open the wizard screen in which you want to make updates.
o) To complete the configuration of your Cisco DNA Center appliance, click Start Configuration.
The configuration process takes roughly 90 minutes. The wizard screen continuously updates during the process,
indicating the tasks that are currently being completed and their progress, as well as any errors that have occurred.
To save a local copy of this information as a text file, click the download icon.
What to do next
When this task is complete:
• If you have an additional appliance to deploy as the third and final node in the cluster, repeat this procedure.
• If you are finished adding nodes to the cluster, continue by performing first-time setup: First-Time Setup
Workflow.
Compatible Browsers
The Cisco DNA Center GUI is compatible with the following HTTPS-enabled browsers:
• Google Chrome: Version 93 or later.
• Mozilla Firefox: Version 92 or later.
We recommend that the client systems you use to log in to Cisco DNA Center be equipped with 64-bit operating
systems and browsers.
When you log in for the first time as the admin superuser (with the username admin and the
SUPER-ADMIN-ROLE assigned), the Quick Start workflow automatically starts. Complete this workflow
to discover the devices that Cisco DNA Center will manage and enable the collection of telemetry from those
devices.
Step 1 After the Cisco DNA Center appliance reboot is completed, launch your browser.
Step 2 Enter the host IP address to access the Cisco DNA Center GUI, using HTTPS:// and the IP address of the Cisco DNA
Center GUI that was displayed at the end of the configuration process.
After entering the IP address, one of the following messages appears (depending on the browser you are using):
• Google Chrome: Your connection is not private
• Mozilla Firefox:
Someone could be trying to impersonate the site and you should not continue.
Websites prove their identity via certificates. Firefox does not trust GUI-IP-address because
its certificate issuer is unknown,
the certificate is self-signed, or the server is not sending the correct intermediate certificates.
These messages appear because the controller uses a self-signed certificate. For information on how Cisco DNA Center
uses certificates, see the "Certificate and Private Key Support" section in the Cisco DNA Center Administrator Guide.
In the next screen, you are prompted to specify a new admin password (as a security measure).
Step 7 Enter your cisco.com username and password (which are used to register software downloads and receive system
communications) and then click Next.
Note If you don't want to enter these credentials at this time, click Skip instead.
The Terms & Conditions screen opens, providing links to the software End User License Agreement (EULA) and any
supplemental terms that are currently available.
Step 8 After reviewing these documents, click Next to accept the EULA.
The Quick Start Overview slider opens. Click > to view a description of the tasks that the Quick Start workflow will
help you complete in order to start using Cisco DNA Center.
c) In the Discover Devices: Provide Credentials screen, enter the information described in the following table for the
type of credentials you want to configure and then click Next:
Field Description
Username Username used to log in to the CLI of the devices in your network.
Password Password used to log in to the CLI of the devices in your network. The password
you enter must be at least eight characters long.
Enable Password Password used to enable a higher privilege level in the CLI. Configure this
password only if your network devices require it.
Community String Read-only community string password used only to view SNMP information on
the device.
Community String Write community string used to make changes to the SNMP information on the
device.
Field Description
Authentication Password Password required to gain access to information from devices that use SNMPv3.
The password must be at least eight characters in length. Note the following
points:
• Some wireless controllers require that passwords be at least 12 characters
long. Be sure to check the minimum password requirements for your wireless
controllers. Failure to ensure these required minimum character lengths for
passwords results in devices not being discovered, monitored, or managed
by Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed in the
configuration.
Authentication Type Hash-based Message Authentication Code (HMAC) type used when either
Authentication and Privacy or Authentication, No Privacy is set as the
authentication mode:
• SHA: HMAC-SHA authentication.
• MD5: HMAC-MD5 authentication.
Note Cisco DNA Center does not support this authentication type
when FIPS mode is enabled.
Privacy Type Privacy type used when Authentication and Privacy is set as the authentication
mode. Choose one of the following privacy types:
• AES128: 128-bit CBC mode AES for encryption.
• CISCOAES192: 192-bit CBC mode AES for encryption.
• CISCOAES256: 256-bit CBC mode AES for encryption.
Field Description
Privacy Password SNMPv3 privacy password that is used to generate the secret key for encrypting
messages are exchanged with devices supported with AES128, AES192, and
AES256 encryption standards. Passwords (or passphrases) must be at least eight
characters long.
Note the following points:
• Some wireless controllers require that passwords be at least 12 characters
long. Be sure to check the minimum password requirements for your wireless
controllers. Failure to ensure these required minimum character lengths for
passwords results in devices not being discovered, monitored, or managed
by Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed in the
configuration.
NETCONF
Port The NETCONF port that Cisco DNA Center should use in order to discover
wireless controllers that run Cisco IOS-XE.
d) In the Create Site screen, group the devices you are going to discover into one site in order to facilitate telemetry
and then click Next.
You can enter the site's information manually or click the location you want to use in the provided map.
e) In the Enable Telemetry screen, check the network components that you want Cisco DNA Center to collect telemetry
for and then click Next.
Note If both the Enable Telemetry and Disable Telemetry options are grayed out, this indicates that either
devices are not capable of supporting telemetry or devices are running an OS version that does not support
telemetry enablement.
f) In the Summary screen, review the settings that you have entered and then do one of the following:
• If you want to make changes, click the appropriate Edit link to open the relevant screen.
• If you're happy with the settings, click Start Discovery and Telemetry. Cisco DNA Center validates your
settings to ensure that they will not result in any issues. After validation is complete, the screen updates.
Cisco DNA Center begins the process of discovering your network's devices and enabling telemetry for the
network components you selected. The process will take a minimum of 30 minutes (more for larger networks).
A message appears at the top of the homepage to indicate when the Quick Start workflow has completed.
• Click the Workflow Home link to access guided workflows that will help you set up and maintain your network.
Note Although pxGrid 2.0 allows up to four pxGrid nodes in the Cisco ISE deployment,
Cisco DNA Center releases earlier than 2.2.1.x do not support more than two
pxGrid nodes.
Note We recommend that you use ERS through the PAN. However, for backup, you
can enable ERS on the PSNs.
• You must enable the pxGrid service on one of the Cisco ISE nodes within the distributed deployment.
Although you can choose to do so, you do not have to enable pxGrid on the PAN. You can enable
pxGrid on any Cisco ISE node in your distributed deployment.
• The PSNs that you configure in Cisco ISE to handle TrustSec or SD Access content and PACs must
also be defined in Work Centers > Trustsec > Trustsec Servers > Trustsec AAA Servers. For
more information, see the Cisco Identity Services Engine Administrator Guide.
• Only a user with Super Admin role permissions can integrate Cisco ISE with Cisco DNA Center.
• Cisco DNA Center does not support ERS API access if the Use CSRF Check for Enhanced Security
option is enabled in Cisco ISE.
• You must enable communication between Cisco DNA Center and Cisco ISE on the following ports: 443,
5222, 8910, and 9060.
• The Cisco ISE host on which pxGrid is enabled must be reachable from Cisco DNA Center on the IP
address of the Cisco ISE eth0 interface.
• The Cisco ISE node can reach the fabric underlay network via the appliance's NIC.
• Cisco DNA Center will check the certificate revocation status if Online Certificate Status Protocol (OCSP)
or certificate revocation list (CRL) validation is defined for the certificates used by the Cisco ISE services.
• The Cisco ISE admin node certificate must contain the Cisco ISE IP address or FQDN in either the
certificate subject name or the Subject Alternative Name (SAN).
• Your ability to use an FQDN-only system certificate depends on whether LAN automation is enabled in
your Cisco DNA Center deployment. For more information, see the alt_names section bullet in Step 3
of the Cisco DNA Center Security Best Practices Guide's "Generate a Certificate Request Using Open
SSL" topic.
Note For Cisco ISE 2.4 Patch 13, 2.6 Patch 7, and 2.7 Patch 3, if you are using the
Cisco ISE default self-signed certificate as the pxGrid certificate, Cisco ISE might
reject that certificate after applying those patches. This is because the older
versions of that certificate have the Netscape Cert Type extension specified as
the SSL server, which now fails (because a client certificate is required).
This issue does not occur in Cisco ISE 3.0 and later. For more information, see
the Cisco ISE Release Notes.
For more information about configuring Cisco ISE for Cisco DNA Center, see the "Integration with Cisco
DNA Center" topic in the Cisco Identity Services Engine Administrator Guide.
e) In the Cisco ISE GUI, click the menu icon ( ) and choose Administration > System > Settings.
f) From the left navigation pane, click ERS Settings to open the ERS Settings window.
g) Click the Enable ERS for Read/Write radio button, and then click OK in the notification prompt.
h) Click Save.
Step 2 Add the Cisco ISE node to Cisco DNA Center as a AAA server:
a) Log in to the Cisco DNA Center GUI.
b) Click the menu icon ( ) and choose System > System 360.
c) In the Identity Services Engine (ISE) pane, click the Configure link.
d) From the Authentication and Policy Servers window, click Add and choose ISE from the drop-down list.
e) Enter the following details in the Add ISE server slide-in pane:
• In the Server IP Address field, enter the IP address of the Cisco ISE server.
• Enter the Shared Secret used to secure communications between your network devices and Cisco ISE.
• In the Username and Password fields, enter the corresponding Cisco ISE admin credentials.
• Enter the FQDN for the Cisco ISE node.
• (Optional) Enter the virtual IP address of the load balancer behind which the Cisco ISE PSNs are located. If
you have multiple policy service node farms behind different load balancers, you can enter a maximum of six
virtual IP addresses.
• Connect to pxGrid: Check this check box under Advanced Settings to enable pxGrid connection.
If you want to use the Cisco DNA Center system certificate as the pxGrid client certificate (sent to ISE to
authenticate the Cisco DNA Center system as a pxGrid client), check the Use Cisco DNA Center Certificate
for pxGrid check box. You can use this option if all the certificates that are used in your operating environments
must be generated by the same Certificate Authority (CA). If this option is disabled, Cisco DNA Center will
send a request to Cisco ISE to generate a pxGrid client certificate for the system to use.
When you enable this option, ensure that:
• The Cisco DNA Center certificate is generated by the same CA as is in use by Cisco ISE (otherwise the
pxGrid authentication will fail).
• The Certificate Extended Key Use (EKU) field includes “Client Authentication”.
• In the Advanced Settings area:
• You can choose the protocol that must be used by checking the check box for RADIUS or TACACS
• Enter the required values in the following fields: Authentication Port, Accounting Port, Retries,
and (Timeout seconds).
Note This option is available only if third-party certificates are used by Cisco DNA Center. If Cisco DNA
Center uses the default self-signed system certificate, then this option is disabled.
f) Click Add.
When the integration with Cisco ISE is initiated, you will see a notification that the certificate from Cisco ISE is not yet
trusted. You can view the certificate to see the details.
Click Accept to trust the certificate and continue with the integration process, or choose Decline if you do not wish to
trust the certificate and terminate the integration process.
Step 3 Verify that Cisco DNA Center is connected to Cisco ISE, and that the Cisco ISE SGT groups and devices are pushed to
Cisco DNA Center:
a) Log in to the Cisco DNA Center GUI.
b) Click the menu icon ( ) and choose System > System 360.
c) In the Identity Services Engine (ISE) pane, verify that the status of all listed ISE servers is displayed as Available
or Configured.
d) In the Identity Services Engine (ISE) pane, click the Update link.
e) From the Authentication and Policy Servers window, verify that the status of the Cisco ISE AAA server is still
Active.
Step 4 Verify that Cisco ISE is connected to Cisco DNA Center and that the connection has subscribers:
a) Log in to the Cisco ISE nodes that are shown as pxGrid servers in the Identity Services Engine (ISE) pane.
b) Choose Administration > pxGrid Services and click the Web Clients tab.
You should see the pxGrid clients in the list with the IP address of the Cisco DNA Center server.
policy data is retained. You must synchronize the policies before you can manage Group-Based Access Control
Policy in Cisco DNA Center.
Contracts
All the SGACLs in Cisco ISE that are referenced by policies are compared to Contracts in Cisco DNA Center.
• When the SGACL and Contract have the same name and content, there is no need for further action. The
information in Cisco DNA Center is consistent with Cisco ISE and does not need to be changed.
• When the SGACL and Contract have the same name, but the content is different, the SGACL content
from Cisco ISE is migrated. The previous Contract content in Cisco DNA Center is discarded.
When the SGACL name does not exist in Cisco DNA Center, a new Contract with that name is created, and
the SGACL content from Cisco ISE is migrated.
Note When creating new Access Contracts based on Cisco ISE SGACL content, Cisco DNA Center parses the text
command lines, and, where possible, renders these SGACL commands as a modeled Access Contract. Each
ACE line renders as an “Advanced” application line. If a Cisco ISE SGACL contains text that cannot be
parsed successfully, the text content of the SGACL is not converted into modeled format. It is stored as raw
command line text. These SGACL text contracts may be edited, but no parsing or syntax checking of the text
content is performed during migration.
Policies
A Policy is uniquely identified by a source group-destination group pair. All Cisco ISE TrustSec Egress Policy
Matrix policies are compared to the policies in Cisco DNA Center.
• When a policy for a source group-destination group references the same SGACL/Contract name in Cisco
ISE, no changes are made.
• When a policy for a source group-destination group references a different SGACL/Contract name in
Cisco ISE, the Cisco ISE Contract name is referenced in the policy. This overwrites the previous Contract
reference in Cisco DNA Center.
• The Cisco ISE default policy is checked and migrated to Cisco DNA Center.
Note Cisco DNA Center supports a single contract in access policies. Cisco ISE has an option to use multiple
SGACLs in access policies, but this option is not enabled by default in Cisco ISE, and in general is not widely
used. Existing SDA customers who have been using the previous release of Cisco DNA Center to manage
Group-Based Access Control policy did not use this option.
If you enabled the option to allow multiple SGACLs on Cisco ISE and used this when creating policies, those
policies cannot be migrated to Cisco DNA Center in this release. The specific policy features that make use
of the “multiple SGACL” option and cannot be migrated are:
• Multiple SGACLs in a policy.
• Policy Level catch-all rules set to “Permit” or “Deny.” Only the value of “None” is currently supported
for migration to Cisco DNA Center.
• Default Policy set to use a customer-created SGACL, but only the standard values of “Permit IP,”
“Permit_IP_Log,” “Deny IP,” and “Deny_IP_Log” are currently supported for migration to Cisco DNA
Center.
If any of the preceding SGACLs are detected during the policy migration and synchronization operation, a
notification is generated, and you must choose between the following options to continue:
• Manage Group-Based Access Control policy in Cisco DNA Center: If this option is selected, all
management of Group-Based Access Control Policy is done in Cisco DNA Center. The user interface
screens in Cisco ISE for management of Cisco ISE Security Groups, SGACLs, and Egress Policies are
available in Read-Only mode. If there were any issues migrating policies (due to use of multiple SGACLs
in Cisco ISE), those policies have no contract selected in Cisco DNA Center. The policy uses the default
policy, and you can select a new contract for those policies after completing the migration. If there was
an problem migrating the default policy, the default policy is set to "Permit."
• Manage Group-Based Access Control Policy in Cisco ISE: If this option is selected, Cisco DNA
Center Group-Based Access Control policy management is inactive. No changes are made to Cisco ISE
and there is no effect on policy enforcement in the network. Group-Based Access Control policy is
managed in Cisco ISE at the TrustSec workcenter.
• Manage Group-Based Access Control policy in both Cisco DNA Center and Cisco ISE: This option
is not recommended for general use, because policy changes made in Cisco ISE are not synchronized
with Cisco DNA Center. The two systems cannot be kept in sync. This option is intended as a short-term
or interim option, and should only be considered when you enabled the “Allow Multiple SGACLs” option
in Cisco ISE. Use this option if you need more time and flexibility updating Cisco ISE.
Note You cannot enable KeyWrap if Cisco DNA Center and Cisco ISE have already
been integrated. To enable this feature, you need to delete Cisco ISE and then
reintegrate it with Cisco DNA Center.
• If you are using another product (not Cisco ISE) to perform AAA functions, make sure to do the following:
• Register Cisco DNA Center with the AAA server, including defining the shared secret on both the
AAA server and Cisco DNA Center.
• Define an attribute name for Cisco DNA Center on the AAA server.
• For a Cisco DNA Center multihost cluster configuration, define all individual host IP addresses and
the virtual IP address for the multihost cluster on the AAA server.
Note Although pxGrid 2.0 allows up to four pxGrid nodes in the Cisco ISE deployment,
Cisco DNA Center releases earlier than 2.2.1.x do not support more than two
pxGrid nodes.
Note We recommend that you use ERS through the PAN. However, for backup, you
can enable ERS on the PSNs.
• You must enable the pxGrid service on one of the Cisco ISE nodes within the distributed
deployment. Although you can choose to do so, you do not have to enable pxGrid on the PAN.
You can enable pxGrid on any Cisco ISE node in your distributed deployment.
• The PSNs that you configure in Cisco ISE to handle TrustSec or SD Access content and PACs
must also be defined in Work Centers > Trustsec > Trustsec Servers > Trustsec AAA
Servers. For more information, see the Cisco Identity Services Engine Administrator Guide.
• You must enable communication between Cisco DNA Center and Cisco ISE on the following ports:
443, 5222, 8910, and 9060.
• The Cisco ISE host on which pxGrid is enabled must be reachable from Cisco DNA Center on the
IP address of the Cisco ISE eth0 interface.
• The Cisco ISE node can reach the fabric underlay network via the appliance's NIC.
• The Cisco ISE admin node certificate must contain the Cisco ISE IP address or FQDN in either the
certificate subject name or the Subject Alternative Name (SAN).
• The Cisco DNA Center system certificate must list both the Cisco DNA Center appliance IP address
and FQDN in the SAN field.
Note For Cisco ISE 2.4 Patch 13, 2.6 Patch 7, and 2.7 Patch 3, if you are using the
Cisco ISE default self-signed certificate as the pxGrid certificate, Cisco ISE might
reject that certificate after applying those patches. This is because the older
versions of that certificate have the Netscape Cert Type extension specified as
the SSL server, which now fails (because a client certificate is required).
This issue does not occur in Cisco ISE 3.0 and later. For more information, see
the Cisco ISE Release Notes.
Step 1 Click the menu icon ( ) and choose System > Settings > External Services > Authentication and Policy Servers.
Step 2 From the Add drop-down list, choose AAA or ISE.
Step 3 To configure the primary AAA server, enter the following information:
• Server IP Address: IP address of the AAA server.
• Shared Secret: Key for device authentications. The shared secret can contain up to 100 characters.
• FQDN: Fully qualified domain name (FQDN) of the Cisco ISE server.
Note • We recommend that you copy the FQDN that is defined in Cisco ISE (Administration >
Deployment > Deployment Nodes > List) and paste it directly into this field.
• The FQDN that you enter must match the FQDN, Common Name (CN), or Subject Alternative
Name (SAN) defined in the Cisco ISE certificate.
The FQDN consists of two parts, a hostname and the domain name, in the following format:
hostname.domainname.com
For example, the FQDN for a Cisco ISE server can be ise.cisco.com.
• Virtual IP Address(es): Virtual IP address of the load balancer behind which the Cisco ISE policy service nodes
(PSNs) are located. If you have multiple PSN farms behind different load balancers, you can enter a maximum of
six virtual IP addresses.
• Protocol: TACACS and RADIUS (the default). You can select both protocols.
Attention If you do not enable TACAS for a Cisco ISE server here, you cannot configure the Cisco ISE server as
a TACACS server under Design > Network Settings > Network when configuring a AAA server for
network device authentication.
• Authentication Port: Port used to relay authentication messages to the AAA server. The default UDP port is 1812.
• Accounting Port: Port used to relay important events to the AAA server. The default UDP port is 1813.
• Port: The default TACACS port is 49.
• Retries: Number of times that Cisco DNA Center attempts to connect with the AAA server before abandoning the
attempt to connect. The default number of attempts is 3.
• Timeout: The time period for which the device waits for the AAA server to respond before abandoning the attempt
to connect. The default timeout is 4 seconds.
Note After the required information is provided, Cisco ISE is integrated with Cisco DNA Center in two phases.
It takes several minutes for the integration to complete. The phase-wise integration status is shown in the
Authentication and Policy Servers window and System 360 window:
Cisco ISE server registration phase:
• Authentication and Policy Servers window: "In Progress"
• System 360 window: "Primary Available"
If the status of the configured Cisco ISE server is shown as "FAILED" due to a password change, click
Retry, and update the password to resynchronize the Cisco ISE connectivity.
Step 1 Click the menu icon ( ) and choose System > Settings > Device Settings > SNMP.
Step 2 Configure the following fields:
• Retries: Number of attempts allowed to connect to the device. Valid values are from 1 to 3. The default is 3.
• Timeout (in Seconds): Number of seconds Cisco DNA Center waits when trying to establish a connection with a
device before timing out. Valid values are from 1 to 300 seconds, in intervals of 5 seconds. The default is 5 seconds.
Troubleshooting Tasks
When troubleshooting issues with the appliance's configuration, you will normally perform the following
tasks:
1. If you are currently using the Cisco DNA Center GUI: Log Out.
2. To reconfigure the appliance's hardware, log in to and use the CIMC GUI, as explained in Steps 12 and
13 of Enable Browser Access to Cisco Integrated Management Controller.
3. To change the appliance configuration, launch and use the Maglev Configuration wizard, as explained in
Reconfigure the Appliance Using the Configuration Wizard.
4. Power-cycle the appliance so that your changes are active: Power-Cycle the Appliance, on page 251.
For more information about the appliance's network adapters, see the Managing Adapters section of the Cisco
UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 3.1. As noted
elsewhere, never attempt to manage the appliance hardware through the Linux CLI. Use only the CIMC GUI
or the Maglev Configuration wizard to change appliance settings.
Log Out
Follow the steps below to log out of the Cisco DNA Center GUI.
For security reasons, we recommend that you log out after you complete a work session. If you do not log
out yourself, you will be logged out automatically after 30 minutes of inactivity.
Step 1 Point your browser to the Cisco IMC IP address you set during the Cisco IMC GUI configuration you performed, and
log in to the Cisco IMC GUI as the Cisco IMC user (see Enable Browser Access to Cisco Integrated Management
Controller).
After successful login, the appliance displays the Cisco Integrated Management Controller Chassis Summary window,
with a hyperlinked menu at the top of the window, as shown below.
Step 2 From the hyperlinked menu, choose Launch KVM and then select either Java based KVM or HTML based KVM. If
you select Java-based KVM, you will need to launch the Java startup file from your browser or file manager in order
to view the KVM console in its own window. If you select HMTL-based KVM, it launches the KVM console in a
separate window or tab automatically.
Irrespective of the KVM type you choose, use the KVM console to monitor the progress of the configuration and respond
to the Maglev Configuration wizard prompts.
Step 5 The Configuration wizard presents an abbreviated version of the same series of screens shown in, for example, Configure
a Secondary Node Using the Maglev Wizard. Make changes to the settings presented, if required. After you finish making
changes on each screen, choose [Next], as needed, to proceed through the Configuration wizard.
Step 6 At the end of the configuration process, a message appears, stating that the Configuration wizard is now ready to apply
your changes. The following options are available:
• [back]: Review and verify your changes.
• [cancel]: Discard your changes and exit the Configuration wizard.
• [proceed]: Save your changes and begin applying them.
Choose proceed>> to complete the installation. The Configuration wizard applies the changes you made.
At the end of the configuration process, a CONFIGURATION SUCCEEDED! message appears.
Caution Power-cycling your appliance from the Cisco IMC GUI can result in the corruption or loss of data. Only do
so if your appliance is completely unresponsive to SSH, the Cisco IMC console, or the physical console.
Step 1 Point your browser to the Cisco IMC IP address you set during the Cisco IMC GUI configuration you performed, and
log in to the Cisco IMC GUI as the Cisco IMC user (see Enable Browser Access to Cisco Integrated Management
Controller, on page 58).
After successful login, the appliance displays the Cisco Integrated Management Controller Chassis Summary window,
with a hyperlinked menu at the top of the window, as shown below.
Step 2 With the KVM displayed, reboot the appliance by choosing Host Power > Power Cycle .
If you are asked to confirm your choice to reboot the appliance, click OK.
Using SSH
If you want to use SSH in order to halt your appliance or perform a warm restart, complete the following
tasks:
Step 1 Using a Secure Shell (SSH) client, log in to the IP address of the Enterprise port of the appliance that needs to be
reconfigured, on port 2222:
ssh maglev@Enterprise-port's-IP-address -p 2222
Step 4 Review the command output that is displayed as the host shuts down.
Step 5 If you halted your appliance, power up the Maglev root process by turning the appliance back on, using the front-panel
power button.
New HA Deployment
To install a brand new HA cluster, complete the following steps:
• Configure the Primary Node Using the Advanced Install Configuration Wizard
Step 2 Confirm that you are using the required interface cable configurations on the primary node.
See Interface Cable Connections.
Step 3 Update the virtual IP address (if the virtual IP address is not yet added).
See Reconfigure the Appliance Using the Configuration Wizard.
If the GlusterFS file system size is larger than 150 GB, complete the steps described in Existing HA Deployment of
Primary Node with Nonstandard Interface Configurations.
Step 3 Reimage the primary node with the required interface cable configuration.
See Interface Cable Connections and Install the Cisco DNA Center ISO Image. Make sure that the VIP has been configured
correctly on the primary node.
Step 4 On the primary node, install the same set of packages that you selected during the backup.
Step 5 Using the backup file that you created in Step 2, restore the remote repository's data.
Step 6 Configure the second and third appliances in the cluster.
• If you are configuring appliances using the Maglev Configuration wizard, see Configure a Secondary Node Using
the Maglev Wizard, on page 103.
• If you are configuring appliances using the browser-based configuration wizard, see the "Configure a Secondary
Appliance Using the Advanced Install Configuration Wizard" topic specific to your appliance:
• Configure a Secondary Node Using the Advanced Install Configuration Wizard
• Configure a Secondary Node Using the Advanced Install Configuration Wizard
1. Click the menu icon ( ) and choose System > Settings > System Configuration > High Availability.
2. Click Activate High Availability.
After you click Activate High Availability, Cisco DNA Center enters into maintenance mode. In this mode,
Cisco DNA Center is unavailable until the redistribution of services is completed. You should take this into
account when scheduling an HA deployment.
Note Cisco DNA Center goes into maintenance mode every time you restore the database, perform a system upgrade
(not a package upgrade), and activate HA (as described above).
Note For information about known HA bugs and workarounds, see “Open Bugs—HA" in the Release Notes for
Cisco Digital Network Architecture Center.
Telemetry
If you enabled telemetry for a device (without enabling the VIP), complete the following steps:
Step 1 Use the sudo maglev-config update command to update the cluster VIP.
Step 2 Disable telemetry on the device:
a. From the Cisco DNA Center home page, choose Network Telemetry from the Tools area.
The Network Telemetry window appears.
b. Click the Site View tab.
c. Check the check box of the device on which you want to disable telemetry, and then choose Actions > Disable
Telemetry.
Step 3 Reenable telemetry using the profile associated with the device previously.
Wireless Controller
You must update the wireless controllers in your network with the new VIP of Cisco DNA Center.